pokiSEC: A Multi-Architecture, Containerized Ephemeral Malware Detonation Sandbox
arxiv.org·2d
🛡️AMD SEV
Preview
Report Post

View PDF HTML (experimental)

Abstract:Dynamic malware analysis requires executing untrusted binaries inside strongly isolated, rapidly resettable environments. In practice, many detonation workflows remain tied to heavyweight hypervisors or dedicated bare-metal labs, limiting portability and automation. This challenge has intensified with the adoption of ARM64 developer hardware (e.g., Apple Silicon), where common open-source sandbox recipes and pre-built environments frequently assume x86_64 hosts and do not translate cleanly across architectures. This paper presents pokiSEC, a lightweight, ephemeral malware detonation sandbox that packages the full virtualization and access stack inside a Docker conta…

Similar Posts

Loading similar posts...