Anti-detection system for virtual machine system

A virtual system and virtual machine technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as security detection work obstacles

Active Publication Date: 2016-06-01
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, from the perspective of computer security software, this is undoubtedly an obstacle to the security detection work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-detection system for virtual machine system
  • Anti-detection system for virtual machine system
  • Anti-detection system for virtual machine system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052]Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0053] see figure 1 , the embodiment of the present invention provides an anti-detection method of a virtual machine system, the method may include the following steps:

[0054] S101: Obtain feature information in the current virtual machine system that has different values ​​from the real system operating environment;

[0055] Among them, the so-called real system operating environment, which can also be called the real host opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-detection system of a virtual machine system. The anti-detection system comprises an anti-detection device of the virtual machine system, the virtual machine system and a real system, wherein after the virtual machine system is started in a real system operation environment, the anti-detection device of the virtual machine system is started, so that the distinguishing feature information, different from the real system operation environment, in the current virtual machine system is conveniently modified by virtue of the anti-detection device of the virtual machine system; and the anti-detection device of the virtual machine system comprises a feature information acquisition unit, a feature information modifying unit and a feature information returning unit. By utilizing the anti-detection system, the purpose of virtual machine anti-detection is achieved, so that a virtual machine can support malicious program analysis work more effectively.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an anti-detection system of a virtual machine system. Background technique [0002] With the development of computer technology and the popularization of computer applications, computer applications have gradually penetrated into various fields of people's production and life, which has greatly improved production efficiency and brought a lot of convenience to all aspects of people's lives. However, with the widespread use of computer equipment, computer malicious programs have also experienced an unprecedented rapid development trend. Every day, a large number of computer malicious programs are written and spread through the network, mobile storage, etc., because most computers Malicious programs are contagious and destructive to a certain extent. The normal operation of computer equipment infected by computer malicious programs will be affected to varying degrees, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 张东谊谢军样
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products