International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 534
SANDBOX TECHNOLOGY
Arockia Panimalar.S1, Tamilselvi.K2, Vani.K3
1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
2,3 III BCA ‘A’, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: The sandbox technology aimstocreateasecureand
virtualized sandbox environment at the level of respective
applications. The sandbox is considered to have a minimal
impact on the semantics as well as the program which is
executed at a time and provides an efficient sandbox
configuration.Themalwares which arecalledasviruses,worms
and bolts have an anti analysis functions to confirm the
connectivity of certain hosts which detects the virtualized
environments. To avoid the impacts from the Internet, the
analyzed environments should be disconnected from the
Internet but they must be able to make malwares believe that
they are connected to the real Internet.
Key Words: Sandbox, System Sandbox, Operating
System Security, Controller Nodes.
1. INTRODUCTION
Sandbox technology is used to avoid a security threat which
runs as separate programsin computer systems. Sandbox is
especially used to execute the code which is not tested or it
may be possibly unverified without harming the host
machine or the operating system. A set of guest programs
are set for the disk to run in a tightly controlled set of
resources. Sandbox in a testing environment is that the
untested codes can be changed and productionenvironment
can be experimented as out righted which includes revision
control and web development.
Fig 1: Production of Data Warehouse in Sandbox
The live servers are protected by sandboxing where the
source code gets distributed and the changes may cause
some of the damages to a mission critical system. The main
aim of the sandbox is to test the minimal functionality of the
code or to test the programs accurately under the wed
development process. To access the development
environment variables are needed. The sandbox can be also
called as a test server or as a working directory or directory
server. This test directory is built with the help of revision
control software. The revision control softwaresareCVSand
sub version (SVN). These softwares are used by developers
to copy a source code tree or a branch of code to work and
examine the process. After testing the code, if thedevelopers
find any changes in the code they should move back to the
own sandbox and merge with their repositoriesand thereby
it will used by other users or else by end users.
2. IMPLEMENTATION OF SANDBOX
A sandbox isespecially implemented for testingthesoftware
in an operating system environment. It is also used for
controlling the resources like file descriptors, memory, file
system space. If the implementation is made by any unified
processthen individual systemresourcesareaccessedwhich
are provided by the operating system. So the system
sandbox provides access control to the individual operating
system components.
3. KEY SYSTEM OF SANDBOX
Some of the operating system key system components are
files, the registry, network interfaces, the CPU, I/O,locksand
processes.
A. Files
The user and operating system data are stored in the file
system. If there is any change in the file system without the
knowledge of user then the data can be removed or it can be
modified directly using the operating system security. The
target of file system is to access the requests which are to be
mapped directly to the required directory containing the
root of the file system. There are two ways for accessing the
file: 1) host of the file system does not know the content 2)
another process reads the arbitrary files in the host system.
B. Registry
The registry contains the configured data of operating
system and also the other applications. As registry is the
main component, it should be specifically secured. Malware
doesn’t alter the data which is stored in the registry.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 535
Fig 2: Sandbox
C. Network Interfaces
Network interfaces are the computer worms which are
contacted through remote servers and also they coordinate
their activities within the system. Network is the creation of
independent environment where the process of arbitrary
communicates with the local network and also on the
internet. Any of the process is unique with its virtual IP
address then the kind of isolation does not get supported
with the sandbox systems. Network isolation is the most
specific sense which is used for controlling and limiting the
access during the process of communication on local
network and also on the internet.
4. ISOLATED SANDBOX AND CONTROLLER NODES
The nodes can be built with the help function based on the
isolated sandboxes. When the environment is disconnected,
it can be managed through actions such as executing and
introducing specimens. The related logs are collected and
carried out without network connections. It can separate
virtual local area network which acts as a security gateway
and a controller node. The control messages from the
management terminal are maintained by mimetic internet
and the malware incubator. The nodesare collectedfromthe
malware incubator.
5. MIMETIC INTERNET
The main role of mimetic internet is to identify the mistakes
made by the malwares. The end view host can be modeledas
the collection of behavior to target the hosts which involves
services like the count of gateways and some of the link
qualities such as the bandwidth and a term called as RTT
which targets each hosts. The mimetic internet consists of
emulated routes and a mimetic target hosts. Mimetic
internet constructs on the virtual environment because it
helps to detect the virtualized environment techniques.
6. CONCLUSION
The goal is to design a system sandbox in the Microsoft
windows system which provides security for the executed
applications. The sandbox model helpsin solvingthecurrent
security problems. The security test showsthe functionality
model. The main drawback of the sandbox is the waste of
storage space. The mimetic internet and the malware
incubator are used with a renewable node. A tool is used by
developers and it is applied to java sandbox to the
applications. Due to the large numberofexistingframeworks
and libraries without the knowledge arise some of the
complaints which are too difficult
7. FUTURE SCOPE
The mechanism of malwares is isolated in a sand box. By
using the mimetic internet the malware incubator can be
renewed actual node. The specimens can be enabled to
download the files and to join the command through real
networks. The applications of the mimetic internet can be
experimented by IP trace based routing devices.
8. REFERENCES
[1] E. Skoudis and L. Zeltser, “MALWARE – Fighting
Malicious Code”, Prentice Hall PTR, ISBN 0-13-1014056,
Pearson Education Inc., 2004.
[2] S. Miwa and H. Ohno, “A Development of Experimental
Environments ”SIOS” and ”VM Nebula” for Reproducing
Internet Security Incidents”, Journal of the NationalInstitute
of Information and Communications Technology, Vol.52
Numbers 1/2 (pp.23-34) 2005, ISSN 1349-3205, Oct. 2005.
[3] E. Eilam, “Reversing: Secrets of Reverse Engineering”,
ISBN 0-7645-7481-7, Wiley Publishing, Inc., 2005.
[4] M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft and A. C.
Snoeren, “Scalability, Fidelity, and Containment in the
Potemkin Virtual Honeyfarm”, Oct. 2005.
[5] S. Crosby, D. E. Williamsand J. Garcia, “Virtualizationwith
Xen: Including Xen Enterprise, Xen Server and Xen Express”,
Syngress Media Inc., ISBN 1-597-491675, 2007.
[6] T. Miyachi, K. Chinen, and Y. Shinoda, “StarBED and
SpringOS: Large-scale GeneralPurposeNetworkTestbedand
Supporting Software”, Valuetools, Oct. 2006.

More Related Content

PDF
Double guard detection project rreport
DOCX
Double guard synopsis
DOC
Current Topics paper A4 submission 4.30.2015 Master Copy
PPTX
Enchaning system effiency through process scanning
PDF
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
PDF
IRJET- Web Application Firewall: Artificial Intelligence ARC
PPTX
Forensic Analysis and Discovery System
PDF
Ceis 9 padeep kumar_final_paper
Double guard detection project rreport
Double guard synopsis
Current Topics paper A4 submission 4.30.2015 Master Copy
Enchaning system effiency through process scanning
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Web Application Firewall: Artificial Intelligence ARC
Forensic Analysis and Discovery System
Ceis 9 padeep kumar_final_paper

What's hot (19)

PDF
IRJET- A Review on Honeypots
PDF
IRJET - Door Lock Control using Wireless Biometric
PDF
Research Paper on Rootkit.
PDF
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
PDF
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
PDF
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
PDF
IRJET- Detection of SQL Injection using Machine Learning : A Survey
PDF
Website vulnerability to session fixation attacks
PDF
Defending Against the Dark Arts of LOLBINS
PDF
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
PDF
Ld3420072014
PDF
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
PPTX
A look at current cyberattacks in Ukraine
PDF
ht-f02-inside-the-world-of-java-applets_final
PDF
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
PDF
A honeynet framework to promote enterprise network security
PDF
Optimised malware detection in digital forensics
PDF
1738 1742
PDF
44641917 091011
IRJET- A Review on Honeypots
IRJET - Door Lock Control using Wireless Biometric
Research Paper on Rootkit.
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET- Detection of SQL Injection using Machine Learning : A Survey
Website vulnerability to session fixation attacks
Defending Against the Dark Arts of LOLBINS
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
Ld3420072014
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
A look at current cyberattacks in Ukraine
ht-f02-inside-the-world-of-java-applets_final
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
A honeynet framework to promote enterprise network security
Optimised malware detection in digital forensics
1738 1742
44641917 091011
Ad

Similar to IRJET- Sandbox Technology (20)

PPTX
Sandboxing - Malware detection.pptx
PPTX
Penetration Testing ethical pen testing.pptx
PDF
Monitoring ICS Communications
PPTX
Countering Innovative Sandbox Evasion Techniques Used by Malware
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PDF
Survey of Rootkit Technologies and Their Impact on Digital Forensics
PDF
unit 2 confinement techniques.pdf
PDF
A network worm vaccine architecture
DOCX
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
Ch14 security
PDF
Paper id 312201513
PDF
On-Analyzing-a-Layered-Defense-System
PDF
115.pdf
PDF
Bugs Ex Ante by Kristaps Dzonsons
DOCX
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
PDF
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
PDF
Finding the needle in the hardware haystack - HRES (1)
PDF
Hacking school computers for fun profit and better grades short
PPT
Rootkit Hunting & Compromise Detection
Sandboxing - Malware detection.pptx
Penetration Testing ethical pen testing.pptx
Monitoring ICS Communications
Countering Innovative Sandbox Evasion Techniques Used by Malware
Sandbox detection: leak, abuse, test - Hacktivity 2015
Survey of Rootkit Technologies and Their Impact on Digital Forensics
unit 2 confinement techniques.pdf
A network worm vaccine architecture
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Ch14 security
Paper id 312201513
On-Analyzing-a-Layered-Defense-System
115.pdf
Bugs Ex Ante by Kristaps Dzonsons
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar...
Finding the needle in the hardware haystack - HRES (1)
Hacking school computers for fun profit and better grades short
Rootkit Hunting & Compromise Detection
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
introduction to high performance computing
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Software Engineering and software moduleing
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Amdahl’s law is explained in the above power point presentations
Categorization of Factors Affecting Classification Algorithms Selection
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
August -2025_Top10 Read_Articles_ijait.pdf
introduction to high performance computing
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Software Engineering and software moduleing
Management Information system : MIS-e-Business Systems.pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Fundamentals of safety and accident prevention -final (1).pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
CyberSecurity Mobile and Wireless Devices
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Exploratory_Data_Analysis_Fundamentals.pdf

IRJET- Sandbox Technology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 534 SANDBOX TECHNOLOGY Arockia Panimalar.S1, Tamilselvi.K2, Vani.K3 1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu 2,3 III BCA ‘A’, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: The sandbox technology aimstocreateasecureand virtualized sandbox environment at the level of respective applications. The sandbox is considered to have a minimal impact on the semantics as well as the program which is executed at a time and provides an efficient sandbox configuration.Themalwares which arecalledasviruses,worms and bolts have an anti analysis functions to confirm the connectivity of certain hosts which detects the virtualized environments. To avoid the impacts from the Internet, the analyzed environments should be disconnected from the Internet but they must be able to make malwares believe that they are connected to the real Internet. Key Words: Sandbox, System Sandbox, Operating System Security, Controller Nodes. 1. INTRODUCTION Sandbox technology is used to avoid a security threat which runs as separate programsin computer systems. Sandbox is especially used to execute the code which is not tested or it may be possibly unverified without harming the host machine or the operating system. A set of guest programs are set for the disk to run in a tightly controlled set of resources. Sandbox in a testing environment is that the untested codes can be changed and productionenvironment can be experimented as out righted which includes revision control and web development. Fig 1: Production of Data Warehouse in Sandbox The live servers are protected by sandboxing where the source code gets distributed and the changes may cause some of the damages to a mission critical system. The main aim of the sandbox is to test the minimal functionality of the code or to test the programs accurately under the wed development process. To access the development environment variables are needed. The sandbox can be also called as a test server or as a working directory or directory server. This test directory is built with the help of revision control software. The revision control softwaresareCVSand sub version (SVN). These softwares are used by developers to copy a source code tree or a branch of code to work and examine the process. After testing the code, if thedevelopers find any changes in the code they should move back to the own sandbox and merge with their repositoriesand thereby it will used by other users or else by end users. 2. IMPLEMENTATION OF SANDBOX A sandbox isespecially implemented for testingthesoftware in an operating system environment. It is also used for controlling the resources like file descriptors, memory, file system space. If the implementation is made by any unified processthen individual systemresourcesareaccessedwhich are provided by the operating system. So the system sandbox provides access control to the individual operating system components. 3. KEY SYSTEM OF SANDBOX Some of the operating system key system components are files, the registry, network interfaces, the CPU, I/O,locksand processes. A. Files The user and operating system data are stored in the file system. If there is any change in the file system without the knowledge of user then the data can be removed or it can be modified directly using the operating system security. The target of file system is to access the requests which are to be mapped directly to the required directory containing the root of the file system. There are two ways for accessing the file: 1) host of the file system does not know the content 2) another process reads the arbitrary files in the host system. B. Registry The registry contains the configured data of operating system and also the other applications. As registry is the main component, it should be specifically secured. Malware doesn’t alter the data which is stored in the registry.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 535 Fig 2: Sandbox C. Network Interfaces Network interfaces are the computer worms which are contacted through remote servers and also they coordinate their activities within the system. Network is the creation of independent environment where the process of arbitrary communicates with the local network and also on the internet. Any of the process is unique with its virtual IP address then the kind of isolation does not get supported with the sandbox systems. Network isolation is the most specific sense which is used for controlling and limiting the access during the process of communication on local network and also on the internet. 4. ISOLATED SANDBOX AND CONTROLLER NODES The nodes can be built with the help function based on the isolated sandboxes. When the environment is disconnected, it can be managed through actions such as executing and introducing specimens. The related logs are collected and carried out without network connections. It can separate virtual local area network which acts as a security gateway and a controller node. The control messages from the management terminal are maintained by mimetic internet and the malware incubator. The nodesare collectedfromthe malware incubator. 5. MIMETIC INTERNET The main role of mimetic internet is to identify the mistakes made by the malwares. The end view host can be modeledas the collection of behavior to target the hosts which involves services like the count of gateways and some of the link qualities such as the bandwidth and a term called as RTT which targets each hosts. The mimetic internet consists of emulated routes and a mimetic target hosts. Mimetic internet constructs on the virtual environment because it helps to detect the virtualized environment techniques. 6. CONCLUSION The goal is to design a system sandbox in the Microsoft windows system which provides security for the executed applications. The sandbox model helpsin solvingthecurrent security problems. The security test showsthe functionality model. The main drawback of the sandbox is the waste of storage space. The mimetic internet and the malware incubator are used with a renewable node. A tool is used by developers and it is applied to java sandbox to the applications. Due to the large numberofexistingframeworks and libraries without the knowledge arise some of the complaints which are too difficult 7. FUTURE SCOPE The mechanism of malwares is isolated in a sand box. By using the mimetic internet the malware incubator can be renewed actual node. The specimens can be enabled to download the files and to join the command through real networks. The applications of the mimetic internet can be experimented by IP trace based routing devices. 8. REFERENCES [1] E. Skoudis and L. Zeltser, “MALWARE – Fighting Malicious Code”, Prentice Hall PTR, ISBN 0-13-1014056, Pearson Education Inc., 2004. [2] S. Miwa and H. Ohno, “A Development of Experimental Environments ”SIOS” and ”VM Nebula” for Reproducing Internet Security Incidents”, Journal of the NationalInstitute of Information and Communications Technology, Vol.52 Numbers 1/2 (pp.23-34) 2005, ISSN 1349-3205, Oct. 2005. [3] E. Eilam, “Reversing: Secrets of Reverse Engineering”, ISBN 0-7645-7481-7, Wiley Publishing, Inc., 2005. [4] M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft and A. C. Snoeren, “Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm”, Oct. 2005. [5] S. Crosby, D. E. Williamsand J. Garcia, “Virtualizationwith Xen: Including Xen Enterprise, Xen Server and Xen Express”, Syngress Media Inc., ISBN 1-597-491675, 2007. [6] T. Miyachi, K. Chinen, and Y. Shinoda, “StarBED and SpringOS: Large-scale GeneralPurposeNetworkTestbedand Supporting Software”, Valuetools, Oct. 2006.