Skip to main content
WorldCist'17 - 5th World Conference on Information Systems and Technologies

Full Program »

A Survey on Anti-Honeypot and Anti-Introspection Methods

Modern virtual machines, debuggers, and sandboxing solutions lend themselves towards more and more inconspicuous ways to run honeypots, and to observe and analyze malware and other malicious activity. This analysis yields valuable data for threat-assessment, malware identification and prevention. However, the use of such introspection methods has caused malware authors to create malicious programs with the ability to detect and evade such environments. This paper presents an overview on existing research of anti-honeypot and anti-introspection methods. We also propose our own taxonomy of detection vectors used by malware.

Author(s):

Joni Uitto    
University of Turku
Finland

Sampsa Rauti    
University of Turku
Finland

Samuel Laurén    
University of Turku
Finland

Ville Leppänen    
University of Turku
Finland

 

Powered by OpenConf®
Copyright ©2002-2016 Zakon Group LLC