The Community for Technology Leaders
RSS Icon
Issue No.11 - November (2008 vol.41)
pp: 22-28
Michael Price , Automatic Partners
Virtualization trims administrative overhead, eases system management, and combats OS-level security vulnerabilities. However, it also exhibits new characteristics and exposes new vulnerabilities that can be detrimental to securing the system.
virtualization, virtual machines, security, IT system management
Michael Price, "The Paradox of Security in Virtual Environments", Computer, vol.41, no. 11, pp. 22-28, November 2008, doi:10.1109/MC.2008.472
1. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection-Based Architecture for Intrusion Detection," Proc. Network and Distributed Systems Security Symp. (NDSS 03), The Internet Society, 2003, pp. 191–206.
2. M. Rosenblum and T. Garfinkel, "Virtual Machine Monitors: Current Technology and Future Trends," Computer, May 2005, pp. 39–47.
3. R. Sailer et al., "Building a General-Purpose Secure Virtual Machine Monitor," tech. report RC23537 (W0502-132), 25 Feb. 2005, IBM Research.
4. P.M. Chen and B.D. Noble, "When Virtual Is Better than Real," Proc. 8th Workshop Hot Topics in Operating Systems (HotOS-VIII), IEEE CS Press, 2001, pp. 133–138.
5. T. Garfinkel and M. Rosenblum, "When Virtual Is Harder than Real: Security Challenges in Virtual Machine-Based Computing Environments," Proc. 10th Workshop Hot Topics in Operating Systems (HotOS-X), Usenix Assoc., 2005; .
6. P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles (SOSP 03), ACM Press, 2003, pp. 164–177.
7. S.T. King et al., "SubVirt: Implementing Malware with Virtual Machines," Proc. 2006 IEEE Symp. Security and Privacy (SP 06), IEEE CS Press, 2006, pp. 314–327.
8. R. Uhlig et al., "Intel Virtualization Technology," Computer, May 2005, pp. 48–56.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool