Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
FYP/README.md
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
59 lines (45 sloc)
2.53 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Disso about VM introspection | |
[Orchestrated Cyber Deception Demonstrator using Virtual Machine Introspection - Digital Marketplace](https://www.digitalmarketplace.service.gov.uk/digital-outcomes-and-specialists/opportunities/14844) | |
## Top Research Engines | |
- Google Scholar | |
- IEEE explorer | |
- ACM Portal | |
- Usenix security | |
# Structure | |
## Proposal (1000-1500 words) | |
- [Research Questions](proposal/Research%20Question.md) | |
- [Keywords](proposal/Keywords.md) | |
- [Project title](proposal/Project%20Title.md) | |
- [Audience and client](proposal/Auience%20and%20Client.md) | |
- Primary Resarch Plan | |
- [Scenario](proposal/Scenario.md) Reviw and ask Dan about it | |
- [Primary Research Plan](proposal/Preliminar%20Research%20Plan.md) | |
- [Project Plan timeline](proposal/Timeline.md) | |
- [Intended Outcome](proposal/Outcome.md) | |
## Lit Review (1000-1500 words) | |
100 Papers > 10 Papers = 2-3 hours | |
just read the abstracts | |
- Abstract and literature review | |
- [Abstract](proposal/Abstract.md) | |
- [Literature Review](proposal/lit%20review.md) | |
- [Bibliography](proposal/Bibliography.md) | |
--- | |
**Others related** | |
- Ethics | |
# Initial Project Topic Idea | |
**date: 08/10/21** | |
4.Outline the real world problem, research question or topic of practical investigation that you would like to conduct in your project. If you are not yet sure then please indicate your area of interest or topic for investigation. Be as specific as you can. | |
Using Virtual Machine Introspection as a tool for Cyber Deception | |
5.Outline the technologies that will be involved in approaching this problem (examples: Data mining, application development, systems design, web development, python programming, multimedia, operating systems, games design, AI, learning algorithms, business process analysis, penetration testing, business continuity planning, robotics, VR/AR, e-commerce, sentiment analysis, other ...) | |
VMI , Command and Control (C2), Low-Level Coding, Open-Source Virtualization Software(KVM), Operating Systems (Debian) | |
# References / Bibliography | |
https://xenproject.org/developers/teams/hvmi/ | |
https://github.com/hvmi/hvmi | |
https://github.com/Wenzel/kvmi | |
https://github.com/Wenzel/awesome-virtualization#virtual-machine-introspection | |
https://hvmi.github.io/blog/introspection/2020/07/30/introduction.html | |
https://hvmi.readthedocs.io/en/latest/ | |
https://github.com/libvmi/libvmi | |
https://psichologyanswers.com/library/lecture/read/14053-what-is-hypervisor-introspection# | |
# windbg | |
windbg -k net:port=50000,key=tg53wpqe2lua.17gu3kjbmfm81.380xm4j58z1oj.3apyut8jryxta |