Abstract
The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package designed to detect blue pills or hypervisors in general. Ever since the blue pill was originally proposed, there has been an ongoing arms race between developers trying to develop stealthy hypervisors and developers trying to detect such stealthy hypervisors. Hypervisors can also be used for monitoring and forensic purposes, while malicious software may include a red pill component to discover such a hypervisor in order to evade it. This chapter discusses a practical approach to counter such malicious software by evading the red pill components.
Original language | English |
---|---|
Pages (from-to) | 461-473 |
Number of pages | 13 |
Journal | Computational Methods in Applied Sciences |
Volume | 56 |
DOIs | |
State | Published - 2022 |
Externally published | Yes |
Keywords
- Forensics
- Information security
- Red pill
- Virtualization