The Anti-Matrix (Take the Blue Pill)

Author(s):  
Aleksandr Tarasov
Keyword(s):  
2010 ◽  
Vol 110 (2) ◽  
pp. 149-152
Author(s):  
R. Andrianne
Keyword(s):  

The Analyst ◽  
1917 ◽  
Vol 42 (492) ◽  
pp. 71
Author(s):  
William Partridge
Keyword(s):  

Sexualities ◽  
2006 ◽  
Vol 9 (3) ◽  
pp. 379-380
Author(s):  
Rebecca F. Plante
Keyword(s):  

2020 ◽  
Vol 34 (S1) ◽  
pp. 1-1
Author(s):  
Justin La Favor ◽  
Matthew DeYong ◽  
Dan Berkowitz ◽  
Trinity Bivalacqua ◽  
Arthur Burnett

2003 ◽  
Author(s):  
Richard L. Griffith ◽  
John E. Deaton ◽  
Lisa A. Steelman
Keyword(s):  

Author(s):  
Asaf Algawi ◽  
Michael Kiperberg ◽  
Roee Shimon Leon ◽  
Amit Resh ◽  
Nezer Jacob Zaidenberg

This article presents the concept of blue pill, a stealth hypervisor-based rootkit, that was introduced by Joanna Rutkowska in 2006. The blue pill is a malicious thin hypervisor-based rootkit that takes control of the victim machine. Furthermore, as the blue pill does not run under the operating system context, the blue pill is very difficult to detect easily. The red pill is the competing concept (i.e., a forensics software that runs on the inspected machine and detects the existence of malicious hypervisor or blue pill). The concept of attestation of a host ensuring that no hypervisor is running was first introduced by Kennel and Jamieson in 2002. Modern advances in hypervisor technology and hardware-assisted virtualization enables more stealth and detection methods. This article presents all the recent innovation in stealth blue pills and forensics red pills.


Sign in / Sign up

Export Citation Format

Share Document