The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2007 vol. 5)
ISSN: 1540-7993
pp: 68-71
Iván Arce , Core Security Technologies
Virtual machines and virtualization technologies aren't new to the computing world--they've been used for at least 40 years. Recently, the availability of virtualization software for low-cost computer equipment and the promise of both tangible reductions on total cost of ownership and rapid return on investment on virtualization projects have moved many organizations to adopt it as a key component of their IT strategy. In this installment of Attack Trends, I'll look at this technology trend with an eye toward security and analyze past and present advances in offensive security tools and techniques
attacks, virtual machines, virtualization, hypervisoring

I. Arce, "Ghost in the Virtual Machine," in IEEE Security & Privacy, vol. 5, no. , pp. 68-71, 2007.
89 ms
(Ver 3.3 (11022016))