jess LAND
        Sponsored by:       
One eSecurity
JISK Knowledgebase >>    About    News    Essentials    Architecture    FWs    IDS/IPS    Honeypots    Malware    Forensics   
  +  JSS Home    Projects    JSS Community    Events    News    Docs    About    Contact .

JISK > Malware > Analysis > Reverse Engineering > AntiRE > VM Detection Malware Section Map

Virtual Machine Detection

Content Leader: Jess Garcia - Last Updated: January 18, 2007

Using VM Detection for defensive purposes

  • The idea is simple: making systems inmune to malware infection by creating a mechanism that emulates VM characteristics in normal systems, so malware which does not run on VMs will not infect them. - Techhawking @


Copyright © 2000-2008 Jessland - Jess Garcia's Website - All rights reserved.