This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Ghost in the Virtual Machine
July/August 2007 (vol. 5 no. 4)
pp. 68-71
Iván Arce, Core Security Technologies
Virtual machines and virtualization technologies aren't new to the computing world--they've been used for at least 40 years. Recently, the availability of virtualization software for low-cost computer equipment and the promise of both tangible reductions on total cost of ownership and rapid return on investment on virtualization projects have moved many organizations to adopt it as a key component of their IT strategy. In this installment of Attack Trends, I'll look at this technology trend with an eye toward security and analyze past and present advances in offensive security tools and techniques
Index Terms:
attacks, virtual machines, virtualization, hypervisoring
Citation:
Iván Arce, "Ghost in the Virtual Machine," IEEE Security & Privacy, vol. 5, no. 4, pp. 68-71, July-Aug. 2007, doi:10.1109/MSP.2007.83
Usage of this product signifies your acceptance of the Terms of Use.