I am looking to simulate ransomware on gem5 to basically perform microarchitectural analysis. I want to simulate an environment where ransomware looks for files on a victim's computer and then encrypts them. I would also like to simulate screen-locker ransomware if possible but file encryption is my top priority. I have looked into other simulation environments like Cuckoo Sandbox but I am new to the field of ransomware and I am not sure if these types of sandbox software can help me analyze instruction patterns, memory access patterns, tweak the scheduler, etc. So, in summary, I am basically looking for ways to analyze the microarchitectural impact of ransomware. Any help is appreciated. Thanks.
Can you simulate a ransomware on gem5?
128 Views Asked by Preet Derasari At
0
There are 0 best solutions below
Related Questions in ARCHITECTURE
- Is it recommended to use Node.js for an online room booking web application?
- Defining Callbacks for custom Javascript Functions
- iOS: app doesn't pass the upload for the architecture
- What is the value of multiple Hybris extensions?
- os kern error : "ld: symbol(s) not found for architecture x86_64"
- How to avoid context in business layer
- Libgdx: Objects creating other objects
- Do software engineers in general have no idea about Software Architecture Design?
- Java generic class that contains an instance of implementation of generic interface
- Web application architecture, N-tiers, 3 tiers or multi-layer
- Is having 3 layers Controller, BO and DAO a standard way? why not just Controller and DAO?
- Architecture for creating a JavaScript framework
- Symfony2 proper use for services
- Refactor some calls on each Zf2 controller action
- Architecture - Task Scheduling (Data File Processing) - Windows Service
Related Questions in SANDBOX
- Running (& compiling) untrusted user code
- Unity3D best way to create an editable voxel environment
- Opening new unsandboxed tab from sandboxed iframe
- Simultaneously sandbox and add JS/HTML to iFrame
- SetExpressCheckout Minimum Variables
- Does MailChimp have a sandbox API with dummy data in it for testing?
- ipn not working with sandbox
- Mac app unable to read app bundle resources
- Itunes connect demo account for reviewing
- How can I make a copy of a DB instance to use as a test/sandbox DB in AWS?
- Accessing Serial Ports with an Application Runs in Flatpak
- How to prevent user copy files from OS X sandbox
- Lua Sandbox "hacking"
- Apple Pay integration on the WEB - setting up the Sandbox environment
- Sandboxing JS Execution within Rails App
Related Questions in MALWARE
- Malware injection in site, how to remedy?
- How can I remove delta-homes.com from browsers?
- What does this code?
- How to analyze Malware when it infected all my exe files
- wordpress malware files inspection
- How would I write a malware detection software?
- What is the difference between different anti-virus and anti-malware apps?
- Javascript malware. How to study a ciphered function?
- Designing a Bash Script to Remove Malware
- Find iframe injection and remove from site
- UIWebView - Advertising banners on loading remote URL on Amazon
- Can't install lxml on OS X 10.8.5
- How do I figure out how a given malware works?
- text section of MFC in memory changes everytime
- Where to find and fix malware infected files in Joomla 2.5
Related Questions in GEM5
- How can I only see the execution process of the instructions of my C code starting at main in gem5 syscall emulation?
- Which version of protoc should I need?
- How can I know what are the optional choices for the gem5 command line options such as --cpu-type?
- is there a solution to solve "Someone allocated physical memory at VA 0x400000...0 without creating a VMA"?
- Can I debug gem5 in vs code?
- Control memory bandwidth in Gem5
- Gem5 full system emulation (x86) - booting linux is very slow
- Is there an alternative to cflush in gem5?
- The execution process of the instruction and the realization in gem5?
- In gem5, how do I know the specific location of the class?
- How to display the microop in the reorder buffer for gem5?
- How to use both python 2.7 and 3 in gem5?
- runing diffrent programs in multiocore architecture in gem5
- How should I define the size of L3 cache in Gem5?
- query related to BigDataBench benchmark and simplescalar tool and gem5 simulator
Related Questions in MICRO-ARCHITECTURE
- How can the processor discern a far return from a near return?
- L1 caches usually have split design, but L2, L3 caches have unified design, why?
- Way prediction in modern cache
- Why did Intel remove the 16-byte branch target alignment Coding Rule from the Optimization Reference Manual?
- The execution process of the instruction and the realization in gem5?
- How to look up what form of an instruction is used, by opcode or disassembly?
- vtune memory-access report showing incorrect output
- Why does a loop transitioning from having its uops fed by the Uop Cache to LSD cause a spike in branch-misses?
- What's the microarchitecture used in the MIPS I.S.A?
- What are my available march/mtune options?
- shifting registers to right in the mic-1 without fetches
- Where does the L1 data cache missing come from in blocked matrix mul on arm?
- Can you simulate a ransomware on gem5?
- Based Indexed Addressing Mode Memory Sum
- Is machine code and assembly code part of the architecture?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?