Researchers Develop Software for Finding Cloud-based Malware

Software for Finding Cloud-based MalwareGoogle has big dreams for cloud computing and already has a number of cloud-based offerings like Google Docs on the market. There is also a dark side to cloud computing with malware and other threats that can be propagated over cloud-based networks.

Researchers from North Carolina State University have developed software that offers new and enhanced security for cloud computing. The software looks for malware and viruses in the so-called hypervisors that cloud networks rely on. Hypervisors are the software components of a cloud-based network that actually create the virtual workspace that separates different systems and OS' that are accessing the cloud.

The problem with some current methods of checking for malware and other threats in cloud-based system is that the software in current use can alert the malware that a check is coming. This allows the malware to effectively hide by returning the runtime to its normal state for the duration of the security scan.

The new software developed by the researchers is able to check for malware without alerting malware that a scan is underway. The software allows the checks to be performed while the hypervisor is operating. The software is called HyperSentry.

“The concern is that an attacker could compromise a hypervisor, giving them control of the cloud,” says Dr. Peng Ning, professor of computer science at NC State and co-author of a paper describing the research. Ning continued stating, "HyperSentry solves two problems. It measures hypervisor integrity in a stealthy way, and it does so in the context of the hypervisor."

Context is an important part of the software and how it works according to Ning. The software Ning developed looks in the hypervisor program memory and at the registers inside the CPUs that are running the program. This allows it to see malware without giving the malware a chance to hide. Once HyperSentry detects a threat, the administrator of the cloud can take steps to eliminate the threat and limit the spread of the threat.

Source: DailyTech

Tags: virtualization

Comments
Add comment

Your name:
Sign in with:
or
Your comment:


Enter code:

E-mail (not required)
E-mail will not be disclosed to the third party


Last news

 
Consumer group recommends iPhone 8 over anniversary model
 
LTE connections wherever you go and instant waking should come to regular PCs, too
 
That fiction is slowly becoming a reality
 
The Snapdragon 845 octa-core SoC includes the Snapdragon X20 LTE modem
 
Human moderators can help make YouTube a safer place for everyone
 
Google says Progressive Web Apps are the future of app-like webpages
 
All 2018 models to sport the 'notch'
 
The biggest exchange in South Korea, where the BTC/KRW pair is at $14,700 now
The Samsung Galaxy A5 (2017) Review
The evolution of the successful smartphone, now with a waterproof body and USB Type-C
February 7, 2017 /
Samsung Galaxy TabPro S - a tablet with the Windows-keyboard
The first Windows-tablet with the 12-inch display Super AMOLED
June 7, 2016 /
Keyboards for iOS
Ten iOS keyboards review
July 18, 2015 /
Samsung E1200 Mobile Phone Review
A cheap phone with a good screen
March 8, 2015 / 4
Creative Sound Blaster Z sound card review
Good sound for those who are not satisfied with the onboard solution
September 25, 2014 / 2
Samsung Galaxy Gear: Smartwatch at High Price
The first smartwatch from Samsung - almost a smartphone with a small body
December 19, 2013 /
 
 

News Archive

 
 
SuMoTuWeThFrSa
     12
3456789
10111213141516
17181920212223
24252627282930
31      




Poll

Do you use microSD card with your phone?
or leave your own version in comments (4)