This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Taming Virtualization
January/February 2008 (vol. 6 no. 1)
pp. 65-67
Martim Carbone, Georgia Institute of Technology
Diego Zamboni, IBM Zurich Research Laboratory
Wenke Lee, Georgia Institute of Technology
The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others

1. A. Seshadri et al., "Secvisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes," Proc. 21st ACM Symp. Operating Systems Principles, ACM Press, 2007, pp. 335–350.
2. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection-Based Architecture for Intrusion Detection," Proc. 2003 Network and Distributed Systems Symp., Internet Soc., 2003, pp. 191–206.

Index Terms:
virtual machines, hypervisor, VM, virtualization, On the Horizon
Citation:
Martim Carbone, Diego Zamboni, Wenke Lee, "Taming Virtualization," IEEE Security & Privacy, vol. 6, no. 1, pp. 65-67, Jan.-Feb. 2008, doi:10.1109/MSP.2008.24
Usage of this product signifies your acceptance of the Terms of Use.