Sophisticated malware frequently employs advanced evasion techniques to remain undetected by traditional security mechanisms. One of the most commonly used tactics is process injection, where malicious code is covertly inserted into the address space of legitimate processes. This allows the malware to operate under the guise of trusted applications, making detection significantly more challenging. In response to this issue, the present study introduces a novel detection methodology that functions entirely outside the virtual machine (out-of-VM). This technique leverages advanced memory introspection to identify and analyze different forms of process injection within virtualized environments. Notably, the approach is agentless, meaning it does not require any software to be installed within the guest VM, thereby eliminating the risk of the detection system itself being compromised or bypassed by the malware. Instead, it analyzes memory from the hypervisor level, providing a more secure and isolated vantage point. Experimental evaluations validate the effectiveness of the proposed method, demonstrating superior performance when compared to existing detection frameworks. Specifically, the method achieves higher detection accuracy, with more true positives and fewer false positives. It is capable of precisely identifying injected memory regions and detecting a broader spectrum of malware types, thereby outperforming current state-of-the-art solutions across all major evaluation metrics.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 40 pages. 6.00x0.10x9.00 inches. In Stock. N° de réf. du vendeur x-9999331343
Quantité disponible : 2 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9789999331340
Quantité disponible : Plus de 20 disponibles
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 408562848
Quantité disponible : 4 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26405640063
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18405640053
Quantité disponible : 4 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Sophisticated malware frequently employs advanced evasion techniques to remain undetected by traditional security mechanisms. One of the most commonly used tactics is process injection, where malicious code is covertly inserted into the address space of legitimate processes. This allows the malware to operate under the guise of trusted applications, making detection significantly more challenging. In response to this issue, the present study introduces a novel detection methodology that functions entirely outside the virtual machine (out-of-VM). This technique leverages advanced memory introspection to identify and analyze different forms of process injection within virtualized environments. Notably, the approach is agentless, meaning it does not require any software to be installed within the guest VM, thereby eliminating the risk of the detection system itself being compromised or bypassed by the malware. Instead, it analyzes memory from the hypervisor level, providing a more secure and isolated vantage point. Experimental evaluations validate the effectiveness of the proposed method, demonstrating superior performance when compared to existing detection frameworks. Specifically, the method achieves higher detection accuracy, with more true positives and fewer false positives. It is capable of precisely identifying injected memory regions and detecting a broader spectrum of malware types, thereby outperforming current state-of-the-art solutions across all major evaluation metrics. N° de réf. du vendeur 9789999331340
Quantité disponible : 2 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Malware Detection in Virtualization Environment | Detecting Process Injection in Virtualized Environment using VM Introspection and Memory Forensics | Darshan Tank | Taschenbuch | Englisch | 2025 | Eliva Press | EAN 9789999331340 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand. N° de réf. du vendeur 134576566
Quantité disponible : 5 disponible(s)