Show simple item record

dc.contributor.advisorHung, Patrick
dc.contributor.authorMettrick, David
dc.date.accessioned2023-03-13T16:33:15Z
dc.date.available2023-03-13T16:33:15Z
dc.date.issued2022-12-01
dc.identifier.urihttps://hdl.handle.net/10155/1585
dc.description.abstractMalware analysts commonly use virtual machines to provide safe environments to study malware. Malware authors in response, include virtual machine detection functions in their malware so it changes its behavior should a virtual machine be detected. It is therefore important for researchers to continuously uncover new virtual machine detection methods that may be exploited by criminals. This thesis explores a method of virtual machine detection that looks for inconsistencies in the following Central Processing Unit (CPU) details: the CPU model, the number of physical cores, the number of logical cores and the cache capacities. Should inconsistencies be detected, a virtual machine is present. We explore our method in scenarios where all CPU cores are assigned to the test virtual machines to determine if inconsistencies exist. In our tests, many of the hypervisors tested possessed inconsistencies that could be used to deduce the presence of a virtual machine.en
dc.description.sponsorshipUniversity of Ontario Institute of Technologyen
dc.language.isoenen
dc.subjectVirtualizationen
dc.subjectHypervisoren
dc.subjectSecurityen
dc.subjectMalwareen
dc.subjectVirtual machineen
dc.titleVirtual machine detection through Central Processing Unit (CPU) detail anomaliesen
dc.typeThesisen
dc.degree.levelMaster of Science (MSc)en
dc.degree.disciplineComputer Scienceen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record