S. Y. DaiF. V. YarochkinY. HuangSY-YEN KUO2018-09-102018-09-102009-11http://scholars.lib.ntu.edu.tw/handle/123456789/352034Behavior-based detection methods have the ability to detect unknown malicious software (malware). The success of behavior-based detection methods must depend on sufficient number of abnormal behavior models. Insufficient number of abnormal behavior models can lead to high false positive and/or false negative rates. The majority of abnormal behavior models can only be derived by observing application behavior at lower level. However the traditional approaches are not very efficient in this type of analysis. In this paper, we present Holography, a virtual hardware-level tool to capture actions of malware programs. Holography does not rely on any driver that is installed on an operating system to log the execution profile of malware programs. Instead, Holography relies on only hardware-level information to capture actions of malware programs. As a result, Holography is invisible to malware programs and therefore cannot be disabled or bypassed by malware programs. © 2009 IEEE.Abnormal behavior models; Behavior-based detection method; Dynamic analysis; Hardware virtualization; Malicious software[SDGs]SDG16Abnormal behavior; Behavior-based detection; Behavior-based detection method; Malicious software; Virtualizations; Computer operating systems; Dynamic analysis; Hardware; Holography; Computer crimeHolography: A Hardware Virtualization Tool for Malware Analysisconference paper10.1109/PRDC.2009.482-s2.0-77649332080