Skip to main content
Log in

The use of virtualization technology in the dynamic analysis of software code

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The problem of software code security analysis has been considered. The significance of using dynamic code analysis methods if the source code is unavailable has been justified. Modern approaches to the problem have been examined. A class of dynamic code analysis methods based on the virtualization technology has been selected. The methodology of using emulators in order to carry out the dynamic software code analysis has been presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zegzhda, D.P. and Kalinin, M.O., Specificity of certification of information security management systems, Mezhregion. konf. “Informatsionnaya bezopasnost’ regionov Rossii (IBRR-2009)”. Mat-ly konf. (Proc. Interreg. Conf. Information Security of Russian Regions (IBRR 2009)), St. Petersburg, 2009, pp. 104–105.

    Google Scholar 

  2. Kalinin, M.O., Organizational and legal aspects of licensing and certification in the field of information security, in Problemy informatsionnoi bezopasnosti: Sb. referatov stud. nauchn. rabot. (Problems of Information Security: Collection of Abstracts of Student Scientific Works), St. Petersburg: SPbGU, 1999, pp. 10–14.

    Google Scholar 

  3. Eilan, E., Reversing: Secrets of Reverse Engineering, Wiley City: Wiley Publishing, 2005, p. 595.

    Google Scholar 

  4. Zegzhda, P.D., Virtualization as a means of ensuring security. Problems and prospects, Konf. “Aktual’nye problemy upravleniya informatsionnoi bezopasnost’yu”. Mat-ly konf. (Proc. Conf. Actual Problems of Information Security Management), Moscow: NIU VShE, 2013.

    Google Scholar 

  5. Zeng, C., Liu, Sh., Chen, L., and Xiao, Da, A virtualization-based method for analysis of Cisco IOS, The Third International Conference on Multimedia Information Networking and Security (MINES), Shanghai, 2011, pp. 330–332.

    Google Scholar 

  6. Muñiz, S. and Ortega, A., Fuzzing and debugging Cisco IOS, Conf. Black Hat Europe+2011, Barcelona, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Yu. Chernov.

Additional information

Original Russian Text © A.Yu. Chernov, A.S. Konoplev, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chernov, A.Y., Konoplev, A.S. The use of virtualization technology in the dynamic analysis of software code. Aut. Control Comp. Sci. 49, 834–837 (2015). https://doi.org/10.3103/S0146411615080234

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080234

Keywords