This Article 
 Bibliographic References 
 Add to: 
Taming Virtualization
January/February 2008 (vol. 6 no. 1)
pp. 65-67
Martim Carbone, Georgia Institute of Technology
Diego Zamboni, IBM Zurich Research Laboratory
Wenke Lee, Georgia Institute of Technology
The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others

1. A. Seshadri et al., "Secvisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes," Proc. 21st ACM Symp. Operating Systems Principles, ACM Press, 2007, pp. 335–350.
2. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection-Based Architecture for Intrusion Detection," Proc. 2003 Network and Distributed Systems Symp., Internet Soc., 2003, pp. 191–206.

Index Terms:
virtual machines, hypervisor, VM, virtualization, On the Horizon
Martim Carbone, Diego Zamboni, Wenke Lee, "Taming Virtualization," IEEE Security & Privacy, vol. 6, no. 1, pp. 65-67, Jan.-Feb. 2008, doi:10.1109/MSP.2008.24
Usage of this product signifies your acceptance of the Terms of Use.