Celeda, P., Krejci, R., Vykopal, J., and Drasar, M. (2010).
Embedded malware-an analysis of the Chuck Norris
botnet. In Computer Network Defense (EC2ND), 2010
European Conference on, pages 3–10. IEEE.
Chen, M., Wan, J., and Li, F. (2012). Machine-to-machine
communications. KSII Transactions on Internet and
Information Systems (TIIS), 6(2):480–497.
Chen, X., Andersen, J., Mao, Z. M., Bailey, M., and
Nazario, J. (2008). Towards an understanding of anti-
virtualization and anti-debugging behavior in modern
malware. In Dependable Systems and Networks With
FTCS and DCC, 2008. DSN 2008. IEEE International
Conference on, pages 177–186. IEEE.
Gavare, A. (2014). GXemul. [Online] Avail-
able from: http://gxemul.sourceforge.net/gxemul-
stable/doc/index.html. [Accessed: 24 February 2015].
Genymobile (2014). Genymotion. [Online] Available from:
http://www.genymotion.com/. [Accessed: 24 Febru-
ary 2015].
Google and Asus (2012). Nexus 7 (2012) Tech
Specs (32GB + Mobile Data). [Online] Avail-
able from: https://support.google.com/nexus/answer/
2841846?hl=en. [Accessed: 24 February 2015].
Google and LG Electronics (2013). Nexus 5 Tech
Specs. [Online] Available from: https://support.
google.com/nexus/answer/3467463?hl=en. [Ac-
cessed: 24 February 2015].
Jacobson, V., Braden, R., and Borman, D. (1992). TCP
extensions for high performance. RFC 1323.
Jia-Bin, W., Yi-Feng, L., and Kai, C. (2012). Virtualiza-
tion detection based on data fusion. In Computer Sci-
ence and Information Processing (CSIP), 2012 Inter-
national Conference on, pages 393–396. IEEE.
Jing, Y., Zhao, Z., Ahn, G.-J., and Hu, H. (2014). Mor-
pheus: automatically generating heuristics to detect
android emulators. In Proceedings of the 30th Annual
Computer Security Applications Conference, pages
216–225. ACM.
Kohno, T., Broido, A., and Claffy, K. C. (2005). Remote
physical device fingerprinting. Dependable and Se-
cure Computing, IEEE Transactions on, 2(2):93–108.
Lee, G. M., Crespi, N., Choi, J. K., and Boussard, M.
(2013). Internet of Things. In Evolution of Telecom-
munication Services, pages 257–282. Springer.
Martignoni, L., Paleari, R., Roglia, G. F., and Bruschi, D.
(2009). Testing CPU emulators. In Proceedings of
the eighteenth international symposium on Software
testing and analysis, pages 261–272. ACM.
Milliken, J., Selis, V., and Marshall, A. (2013). Detec-
tion and analysis of the Chameleon WiFi access point
virus. EURASIP Journal on Information Security,
2013(1):1–14.
Nitti, M., Girau, R., and Atzori, L. (2014). Trustworthiness
management in the social Internet of Things. Knowl-
edge and Data Engineering, IEEE Transactions on,
26(5):1253–1266.
Open Virtual Platform (2014). OVPsim. [On-
line] Available from: http://www.ovpworld.org/
technology
ovpsim.php. [Accessed: 24 February
2015].
Oracle Corporation (2014). VirtualBox. [Online] Avail-
able from: https://www.virtualbox.org/. [Accessed:
24 February 2015].
Ortega, A. L. (2013). MAC Changer. [Online] Available
from: http://www.gnu.org/software/macchanger. [Ac-
cessed: 24 February 2015].
PC Engines GmbH (2007). ALIX 6F2 System Board.
[Online] Available from: http://www.pcengines.ch/
alix6f2.htm. [Accessed: 24 February 2015].
Polc´ak, L. and Frankov´a, B. (2014). On reliability of
clockskew-based remote computer identification. In
International Conference on Security and Cryptogra-
phy. SciTePress-Science and Technology Publications.
Polc´ak, L., Jir´asek, J., and Matousek, P. (2014). Com-
ment on remote physical device fingerprinting. IEEE
Transactions on Dependable and Secure Computing,
(5):494–496.
Quist, D. and Smith, V. (2006). Further down the VM
spiral-detection of full and partial emulation for IA-
32 virtual machines. Proceedings of the Defcon, 14.
Raffetseder, T., Kruegel, C., and Kirda, E.(2007). Detecting
system emulators. In Information Security, pages 1–
18. Springer.
Raspberry Pi Foundation (2012). Early versions of the
Raspberry Pi Model B. [Online] Available from:
http://www.raspberrypi.org/documentation/hardware/
raspberrypi/models/README.md#modelb. [Ac-
cessed: 24 February 2015].
Rutkowska, J. (2004). Red pill: Detect VMM using
(almost) one CPU instruction. [Online] Available
from: http://web.archive.org/web/20041130172213/
http://invisiblethings.org/papers/redpill.html. [Ac-
cessed: 24 February 2015].
Saied, Y. B., Olivereau, A., Zeghlache, D., and Laurent, M.
(2013). Trust management system design for the In-
ternet of Things: A context-aware and multi-service
approach. Computers & Security, 39:351–365.
Shi, H., Alwabel, A., and Mirkovic, J. (2014). Cardinal pill
testing of system virtual machines. In Proceedings of
the 23rd USENIX conference on Security Symposium
(SEC’14). USENIX Association, Berkeley, CA, USA,
pages 271–285.
Vidas, T. and Christin, N. (2014). Evading android runtime
analysis via sandbox detection. In Proceedings of the
9th ACM symposium on Information, computer and
communications security, pages 447–458. ACM.
VMware Inc (2015). VMware Player. [Online] Avail-
able from: https://www.vmware.com/. [Accessed: 24
February 2015].
MEDA:AMachineEmulationDetectionAlgorithm
235