A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world

AM Azab, P Ning, J Shah, Q Chen, R Bhutkar… - Proceedings of the …, 2014 - dl.acm.org
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-
time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more …

Inktag: Secure applications on an untrusted operating system

OS Hofmann, S Kim, AM Dunn, MZ Lee… - Proceedings of the …, 2013 - dl.acm.org
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-
assurance processes even in the presence of a malicious operating system. InkTag …

On the detection of kernel-level rootkits using hardware performance counters

B Singh, D Evtyushkin, J Elwell, R Riley… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Recent work has investigated the use of hardware performance counters (HPCs) for the
detection of malware running on a system. These works gather traces of HPCs for a variety …

Cloud security is not (just) virtualization security: a short paper

M Christodorescu, R Sailer, DL Schales… - Proceedings of the …, 2009 - dl.acm.org
Cloud infrastructure commonly relies on virtualization. Customers provide their own VMs,
and the cloud provider runs them often without knowledge of the guest OSes or their …

Ensuring operating system kernel integrity with OSck

OS Hofmann, AM Dunn, S Kim, I Roy… - ACM SIGARCH Computer …, 2011 - dl.acm.org
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat
to system security. This paper presents OSck, a system that discovers kernel rootkits by …

[PDF][PDF] SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.

AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen… - NDSS, 2016 - internetsociety.org
Previous research on kernel monitoring and protection widely relies on higher privileged
system components, such as hardware virtualization extensions, to isolate security tools …

A lightweight live memory forensic approach based on hardware virtualization

Y Cheng, X Fu, X Du, B Luo, M Guizani - Information Sciences, 2017 - Elsevier
The results of memory forensics can not only be used as evidence in court but are also
beneficial for analyzing vulnerability and improving security. Thus, memory forensics has …

Vigilare: toward snoop-based kernel integrity monitor

H Moon, H Lee, J Lee, K Kim, Y Paek… - Proceedings of the 2012 …, 2012 - dl.acm.org
In this paper, we present Vigilare system, a kernel integrity monitor that is architected to
snoop the bus traffic of the host system from a separate independent hardware. This snoop …

Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object

H Lee, H Moon, I Heo, D Jang, J Jang… - … on Dependable and …, 2017 - ieeexplore.ieee.org
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-
level malwares. However, the existing external approaches have been limited to monitoring …