The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2007 vol.5)
pp: 68-71
Iván Arce , Core Security Technologies
ABSTRACT
Virtual machines and virtualization technologies aren't new to the computing world--they've been used for at least 40 years. Recently, the availability of virtualization software for low-cost computer equipment and the promise of both tangible reductions on total cost of ownership and rapid return on investment on virtualization projects have moved many organizations to adopt it as a key component of their IT strategy. In this installment of Attack Trends, I'll look at this technology trend with an eye toward security and analyze past and present advances in offensive security tools and techniques
INDEX TERMS
attacks, virtual machines, virtualization, hypervisoring
CITATION
Iván Arce, "Ghost in the Virtual Machine", IEEE Security & Privacy, vol.5, no. 4, pp. 68-71, July/August 2007, doi:10.1109/MSP.2007.83
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool