Modern Blue Pills and Red Pills

  title={Modern Blue Pills and Red Pills},
  author={Asaf Algawi and Michael Kiperberg and R. Leon and A. Resh and N. Zaidenberg},
Johanna Rutkowska first introduced the concept of the blue pill and the red pill (Rutkowska 2006). The blue pill is a hypervisor-based rootkit that takes control of a victim host computer. A red pill is a software tool designed to detect a blue pill. A term that is closely related to trusted computing is the attestation concept (Zaidenberg et al. 2015), where a remote host or local software tries to ensure the integrity of the local machine. This concept was also researched by Kennell et al… Expand
3 Citations


Trusted Computing and DRM
  • 3
  • PDF
An efficient VM-based software protection
  • 17
  • PDF
Encyclopedia of Criminal Activities and the Deep Web
  • 2020
Encyclopedia of Criminal Activities and the Deep Web
  • 2020
Add to Cart" button on the product's webpage: www
    InfoSci-Security and Forensics, InfoSci-Select, InfoSci-Computer Science and IT Knowledge Solutions -Books
    • This title is available in Advances in Criminology, Criminal Justice, and Penology, InfoSci-Books