minimize security issues towards VM. Therefore,
security risk towards cloud computing that utilize
VM as the main technology could be reduced.
By VM detection, malicious system could
withdraw any harmful operations such as botnet
attack and hiding itself from the VM security
systems. As the result, malware may avoid from
being detected by VM security applications, thus
reducing the risk for their behavior from being
studied and revealed. Attackers may now write
programs that first try to detect either the system are
running on VM or not before executing any
destructive or security breaching operations. The
malware could than selectively targeting to only
execute their operation on native machines or client
devices such as smart phones and mobile devices.
This will creates critical vulnerability in cloud
computing. Furthermore if majority of future
malware detection such as honeypot runs on virtual
machine, malware will eventually choose not to run
at all on those environments. The malware attacks
will be escaping from detection and exploiting of the
VM itself (Ferrie, P., 2007).
Enterprises are also trending in using smart and
mobile device that runs on Android, Apple iOS,
Apple Mac OS X, Blackberry and etc. This trend is
the result from the emerging use of cloud computing
environment as information are now easily can be
accessed through the cloud computing. Enterprises
will provide the mobile devices to their employees
in order to give better mobility in completing their
daily task. In such cases the required thin client
software applications such as those that are related
to sales, finance and customer managements will be
made available to be downloaded to the devices.
However, before the applications could be released
to the employees, we predict that there are high
possibilities that implementation and testing process
for the applications will be done using emulator in
the VM on the cloud computing environment. The
applications test results might not give the true
results, especially in term of security testing against
various malicious code because the malicious
operation may not show their behavior when they
had detected that the running environment are VM.
As a result once the application released, the mobile
device and other stand-alone environment might be
compromised in such a way that the malware will
start to execute malicious behavior once it had
detected that it is not on a VM environment.
Therefore data that are stored or communications
through the mobile devices might be revealed to
malicious third party.
3 RELATED WORKS
In previous researches, one of the methods for
detecting execution within a VM, have typically
focused on specific artifacts of the implementation,
such as hardware naming, guest-to-host
communications systems, or memory addresses.
Functional and transparency detection method was
discussed in (Ferrie, P., 2007; Garfinkel, T., et al.,
2007) by highlighting detection strategies that look
upon the characteristic of logical discrepancies,
resource discrepancies and timing discrepancies
between VM and non-VM environment. Detection
method that focuses on differences in performance
between VM and physical hardware were also
discussed. However, as machines that are being used
to host the VM are continuously improved, the
difference according to performance might be
different and more tests need to be done constantly
to verify current situation. A light weight detection
method of Virtual Machine Monitor using CPU
instruction execution performance stability had been
studied in (K. Miyamoto, et al., 2011). However, this
method required adjustment to be made in operating
system (OS) and could lead to instability in the OS
itself. On the other hand, detection method that
focuses on network implementation and VM
behavior could be considered as a technique for
remotely detecting VM without compromising the
target. Method that using network timestamps was
first exploited by (Kohno, T., et al.,2005) using TCP
timestamps as a convert channel to reveal a target
host’s physical clock skew, which uniquely identifies
a physical machine.
Malware will try to avoid honeypots that are
mainly implemented in VM to trace and record their
behavior and signature. One of the honeypot tools is
the automated solution, dynamic malware testing
systems TTAnalyze (Bayer, U., et al., 2006) was
proposed and became the ideal tool for quickly
getting an understanding of the behavior of an
unknown malware. This tool automatically loads the
sample of malicious code to be analyzed into a
virtual machine environment and execute it. The
tools recorded the interaction with the operating
system that involves recording which system calls
were invoked, together with their parameters. This
tool could be considered as the early stage of
implementation of honeypots in VM. Meanwhile,
Temporal Search is a behavior based analysis
technique that exploits the fact that, using processor
performance to measure time can be inaccurate and
the only way for malware to coordinate malicious
VulnerabilityAnalysisusingNetworkTimestampsinFullVirtualizationVirtualMachine
85