Circumventing cryptography in virtualized environments

@article{Hay2012CircumventingCI,
  title={Circumventing cryptography in virtualized environments},
  author={Brian Hay and Kara L. Nance},
  journal={2012 7th International Conference on Malicious and Unwanted Software},
  year={2012},
  pages={32-38}
}
The use of cryptography is becoming increasingly prevalent, and we see it in more and more contexts -on both sides of the fence. It is used to protect data from unauthorized access, but is also being used by adversaries - often for botnet C&C, manual control of compromised hosts, and data exfiltration. Virtual Machine Introspection (VMI) provides a… CONTINUE READING