Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot.
Nezer Jacob ZaidenbergMichael KiperbergRaz Ben YehudaRoee LeonAsaf AlgawiAmit ReshPublished in: ICISSP (Revised Selected Papers) (2019)
Keyphrases
- operating system
- virtual machine
- network resources
- memory management
- memory requirements
- reverse engineering
- real time
- case study
- computer systems
- computing resources
- low memory
- database
- memory size
- malware detection
- control flow
- memory space
- computing power
- memory usage
- network management
- computational power
- information systems
- neural network