Anti-detecting method and device of virtual machine system

A technology of virtual system and virtual machine, which is applied in the field of anti-detection of virtual machine system, and can solve problems such as security detection work obstacles

Inactive Publication Date: 2013-04-03
BEIJING QIHOO TECH CO LTD +1
View PDF2 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, from the perspective of computer security software, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-detecting method and device of virtual machine system
  • Anti-detecting method and device of virtual machine system
  • Anti-detecting method and device of virtual machine system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0088] see figure 1 , the embodiment of the present invention provides an anti-detection method of a virtual machine system, the method may include the following steps:

[0089] S101: Obtain feature information in the current virtual machine system that has different values ​​from the real system operating environment;

[0090] Among them, the so-called real system operating environment, which can also be called the real host oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-detecting method and an anti-detecting device of a virtual machine system. The method comprises the following steps that feature information with a different value in a current virtual machine system from the operating environment of a real system is obtained; the value of the feature information in the current virtual machine system is modified into the same value in the operating environment of the real system; and when a request that the feature information in the current virtual machine system is inquired is received, the modified value is returned, so that the inquired result in the virtual machine system is the same as that in the operating environment of the real system. Through the anti-detecting method, the anti-detecting purpose of a virtual machine can be achieved, so that the virtual machine can effectively support malicious program analysis.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an anti-detection method and device for a virtual machine system. Background technique [0002] With the development of computer technology and the popularization of computer applications, computer applications have gradually penetrated into various fields of people's production and life, which has greatly improved production efficiency and brought a lot of convenience to all aspects of people's lives. However, with the widespread use of computer equipment, computer malicious programs have also experienced an unprecedented rapid development trend. Every day, a large number of computer malicious programs are written and spread through the network, mobile storage, etc., because most computers Malicious programs are contagious and destructive to a certain extent. The normal operation of computer equipment infected by computer malicious programs will be affected to varying ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 张东谊谢军样
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products