Front Inner Page - Volume 2 No.4 August 2015

  • » Back to Index

  • Title

    :

    Based on Green Computing World, the Hybrid Malware Detect Memory Mapper in Kernel Centric Virtual Machine

    Authors

    :

    Ms.E.Priyanka1, Mr. J.Jayachandran2

    Keywords

    :

    Kernel malware, rootkits, mapped memory

    Issue Date

    :

    August – 2015

    Abstract

    :

    Kernel malwares can provide user level-malware characteristics with additional probabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. Many research proceeds on malware hooking behavior and defense and preventive actions for the same. Still, an automated analysis of the actual malicious goals and patching the behavior is not investigated properly. Hybrid Malware detect memory Mapped provides an optimized solution to analyze extract malicious behaviors from root kits and windows kernel-level code, including sensitive data access, modification and triggers. A new technique which provides a combination of backward slicing option to check the mapped memory by slicing step by step in the kernel level. It will identify the malware influenced sensitive data and possible solution for this problem. 

    Page(s)

    :

    1-6

    ISSN

    :

    2347- 4734

    Source

    :

    Vol. 2, No.4, August 2015

    Download

    :


  • » Back index