Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
# Disso about VM introspection
[Orchestrated Cyber Deception Demonstrator using Virtual Machine Introspection - Digital Marketplace](https://www.digitalmarketplace.service.gov.uk/digital-outcomes-and-specialists/opportunities/14844)
## Top Research Engines
- Google Scholar
- IEEE explorer
- ACM Portal
- Usenix security
# Structure
## Proposal (1000-1500 words)
- [Research Questions](proposal/Research%20Question.md)
- [Keywords](proposal/Keywords.md)
- [Project title](proposal/Project%20Title.md)
- [Audience and client](proposal/Auience%20and%20Client.md)
- Primary Resarch Plan
- [Scenario](proposal/Scenario.md) Reviw and ask Dan about it
- [Primary Research Plan](proposal/Preliminar%20Research%20Plan.md)
- [Project Plan timeline](proposal/Timeline.md)
- [Intended Outcome](proposal/Outcome.md)
## Lit Review (1000-1500 words)
100 Papers > 10 Papers = 2-3 hours
just read the abstracts
- Abstract and literature review
- [Abstract](proposal/Abstract.md)
- [Literature Review](proposal/lit%20review.md)
- [Bibliography](proposal/Bibliography.md)
---
**Others related**
- Ethics
# Initial Project Topic Idea
**date: 08/10/21**
4.Outline the real world problem, research question or topic of practical investigation that you would like to conduct in your project. If you are not yet sure then please indicate your area of interest or topic for investigation. Be as specific as you can.
Using Virtual Machine Introspection as a tool for Cyber Deception
5.Outline the technologies that will be involved in approaching this problem (examples: Data mining, application development, systems design, web development, python programming, multimedia, operating systems, games design, AI, learning algorithms, business process analysis, penetration testing, business continuity planning, robotics, VR/AR, e-commerce, sentiment analysis, other ...)
VMI , Command and Control (C2), Low-Level Coding, Open-Source Virtualization Software(KVM), Operating Systems (Debian)
# References / Bibliography
https://xenproject.org/developers/teams/hvmi/
https://github.com/hvmi/hvmi
https://github.com/Wenzel/kvmi
https://github.com/Wenzel/awesome-virtualization#virtual-machine-introspection
https://hvmi.github.io/blog/introspection/2020/07/30/introduction.html
https://hvmi.readthedocs.io/en/latest/
https://github.com/libvmi/libvmi
https://psichologyanswers.com/library/lecture/read/14053-what-is-hypervisor-introspection#
# windbg
windbg -k net:port=50000,key=tg53wpqe2lua.17gu3kjbmfm81.380xm4j58z1oj.3apyut8jryxta