Compatibility is Not Transparency: VMM Detection Myths and Realities

Authors: Tal Garfinkel, Keith Adams, Andrew Warfield , Jason Franklin

Reference:
In the 11th Workshop on Hot Topics in Operating Systems (HOTOS-X).

Abstract:
Recent work on applications ranging from realistic honeypots to stealthier rootkits has speculated about building transparent VMMs -- VMMs that are indistinguishable from native hardware, even to a dedicated adversary. We survey anomalies between real and virtual hardware and consider methods for detecting such anomalies, as well as possible countermeasures. We conclude that building a transparent VMM is fundamentally infeasible, as well as impractical from a performance and engineering standpoint.

Full paper: [ps] [pdf] [Bibtex Entry]