Issue No. 01 - January/February (2008 vol. 6)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2008.24
Martim Carbone , Georgia Institute of Technology
Diego Zamboni , IBM Zurich Research Laboratory
Wenke Lee , Georgia Institute of Technology
The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others
virtual machines, hypervisor, VM, virtualization, On the Horizon
M. Carbone, W. Lee and D. Zamboni, "Taming Virtualization," in IEEE Security & Privacy, vol. 6, no. , pp. 65-67, 2008.