Abstract

With the development of computer science, the detection of virtual machines and the masking of the virtual machine monitor is an important topic in academia. However, limited research has been conducted in the field of remote detection of virtual machines. Remote virtual machine detection is used in lots of fields such as cheating detection, sandboxing, and in phishing websites. In this paper, we review the existing methods of detection of virtual machines remotely from with the access limited to the browser ecosystem of the client side. We review 7 different attacks and verify their usability in different setups comprising combinations of multiple host OS and browser ecosystems. We also provide methods to hide the presence of virtual machines in these particular attack strategies. The goal of this paper is to encourage interest in this field.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call