This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Paradox of Security in Virtual Environments
November 2008 (vol. 41 no. 11)
pp. 22-28
Michael Price, Automatic Partners
Virtualization trims administrative overhead, eases system management, and combats OS-level security vulnerabilities. However, it also exhibits new characteristics and exposes new vulnerabilities that can be detrimental to securing the system.

1. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection-Based Architecture for Intrusion Detection," Proc. Network and Distributed Systems Security Symp. (NDSS 03), The Internet Society, 2003, pp. 191–206.
2. M. Rosenblum and T. Garfinkel, "Virtual Machine Monitors: Current Technology and Future Trends," Computer, May 2005, pp. 39–47.
3. R. Sailer et al., "Building a General-Purpose Secure Virtual Machine Monitor," tech. report RC23537 (W0502-132), 25 Feb. 2005, IBM Research.
4. P.M. Chen and B.D. Noble, "When Virtual Is Better than Real," Proc. 8th Workshop Hot Topics in Operating Systems (HotOS-VIII), IEEE CS Press, 2001, pp. 133–138.
5. T. Garfinkel and M. Rosenblum, "When Virtual Is Harder than Real: Security Challenges in Virtual Machine-Based Computing Environments," Proc. 10th Workshop Hot Topics in Operating Systems (HotOS-X), Usenix Assoc., 2005; www.stanford.edu/~talg/papers/HOTOS05virtual-harderhotos05.pdf .
6. P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles (SOSP 03), ACM Press, 2003, pp. 164–177.
7. S.T. King et al., "SubVirt: Implementing Malware with Virtual Machines," Proc. 2006 IEEE Symp. Security and Privacy (SP 06), IEEE CS Press, 2006, pp. 314–327.
8. R. Uhlig et al., "Intel Virtualization Technology," Computer, May 2005, pp. 48–56.

Index Terms:
virtualization, virtual machines, security, IT system management
Citation:
Michael Price, "The Paradox of Security in Virtual Environments," Computer, vol. 41, no. 11, pp. 22-28, Nov. 2008, doi:10.1109/MC.2008.472
Usage of this product signifies your acceptance of the Terms of Use.