I am looking to simulate ransomware on gem5 to basically perform microarchitectural analysis. I want to simulate an environment where ransomware looks for files on a victim's computer and then encrypts them. I would also like to simulate screen-locker ransomware if possible but file encryption is my top priority. I have looked into other simulation environments like Cuckoo Sandbox but I am new to the field of ransomware and I am not sure if these types of sandbox software can help me analyze instruction patterns, memory access patterns, tweak the scheduler, etc. So, in summary, I am basically looking for ways to analyze the microarchitectural impact of ransomware. Any help is appreciated. Thanks.
Related Questions in ARCHITECTURE
- Where to store secret token for an embeddable web widget?
- Separation of Students and Users in NestJS Microservice architecture
- What's the right ZMQ architecture for my scenario?
- Javers in microservice architecture
- How to prevent users from creating custom client apps?
- How to manage different repositories for different clients with the same project?
- Adding users file storage feature to my application
- Transform Load pipeline for a logs system: Apache Airflow or Kafka Connect?
- Shoulld I decode JWT only on auth server?
- How to stored last ~1500 events in Sorted Set in Redis
- Should data be standardized on the backend or the client (front-end, mobile app)?
- Can I treat CNN channels separately to make placement predictions?
- How to handle sync distributed transaction in microservices?
- Database design, authentication and authorization in a microservices ticketing system
- Is there any example or design of a queue system in microservices?
Related Questions in SANDBOX
- How do I separate emails (from 1 alias) in Thunderbird from invasive websites on Firefox with file browsing scripts? Should I worry?
- what's meaning, process is not in an inherited sandbox, when i run my helper app within a electron build app
- Resetting NetSuite Sandbox to Default Without Production Data
- simulate paypal payments with sandbox credit cards generator
- Pdf is not loading on mobile broswer
- How to use xdg-open in bwrap environment to open dir in the unsandboxed filesystem
- Upgraded Azure Data Explorer to python sandbox image 3.10 - impossible to install (extract) external packages
- Azure app authentication with Sandbox account returns "unauthorized_client: The client does not exist or is not enabled for consumers." error
- No handlers could be found for logger "cuckoo"
- Swift Vapor Console App - The operation couldn’t be completed. Permission denied
- How to prevent external script from top level navigation
- Amazon SPAPI error "could match input arguments"
- snakemake has issue with using singularity
- Will the privacy sandbox have an impact on xmlhttprequest requests and will there be a problem with authentication?
- PayPal payment showing as pending in hotel booking lite plugin on localhost
Related Questions in MALWARE
- Persistent Browser Extension Reinstalls Itself: How to Eradicate ‘YOfficeStop’ Permanently on Windows 7?
- USB is not recognized
- Remove Malware wp-cleansong
- Wordpress /wp-admin keeps reloading
- How do I decode malicious PHP code to find out what it does?
- How can I be sure that my keyboard is doing only what it supposed to do?
- Is deleting all partitions on USB is safe?
- PyInstalled my app and now Windows Defender thinks its a trojan? wth
- Can Android Studio be setup as an environment for malware analysis?
- FireEyeSUT Folder on C: Drive
- Raw Shellcode Injection (Quasar Rat)
- XOR encryption in payloads
- Tensorflow .pb file extension blocked by policy - risk of ransomware?
- What does this PowerShell script do? Is it malware? It auto-runs itself on my computer
- Java String Deobfuscation
Related Questions in GEM5
- How to change the gem5 RVV vector length
- running SPEC in gem5 using the SimPoint methodology
- Can gem5 ensure consistent execution time for the same code?
- warn: MOVNTDQ: Ignoring non-temporal hint, modeling as cacheable!, While simulating x86 with spec2006 benchamrks I am getting stuck in warn message
- how to simulate NUMA in gem5?
- stdio.h error when creating a binary for C code to target x86
- ssh is disconnected when gem5 is compiled
- How to configure Hybrid memory in Gem5
- Modifying CPU Paramteres in Gem5 From Config
- Error while building DSENT to model power & area of NoC
- Issues regarding Gem5 Indirect Memory Prefetcher
- L1 Misses in Gem5 not matching L2 Hits+Misses
- Issues cross-compiling on WSL2 -> RISCV in order to simulate with GEM5
- How should I set the valid bit of cache block to "1" for the first time in Gem5 without error?
- If I want to observe the prediction accuracy of different branches of O3cpu in gem5, should I modify the O3 code? If so, do I need to rebuild gem5
Related Questions in MICRO-ARCHITECTURE
- What is causing the store latency in this program?
- How to load a microapp dynamically in angular 16
- How instructions are fetched into modern CPUs(2023)?
- Are any instructions affected by IA32_UARCH_MISC_CTL[DOITM] in existing CPUs?
- Verilator does not seem to recognize casez statement, any idea of how to solve this?
- intel alderlake performance degradation after spin wait
- Is port blocked when data is fetching from cache or memory in CPU microarchitecture?
- Is machine code and assembly code part of the architecture?
- How does the Program read 32 bit from the memory in a single clock cycle?
- Does storing false bool values cost less electrical energy?
- Memory loads experience different latency on the same core
- Do memory instructions pass through the load-store queue and issue queue in the microarchitecture
- Does L1 cache accept new incoming requests while its Line Fill Buffers (LFBs) are fully exhausted?
- vtune memory-access report showing incorrect output
- how do conditional branches and instructions which update conditional flags operate in an out of order arm architecture?
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)