The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2008 vol.6)
pp: 65-67
Martim Carbone , Georgia Institute of Technology
Diego Zamboni , IBM Zurich Research Laboratory
Wenke Lee , Georgia Institute of Technology
The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others
virtual machines, hypervisor, VM, virtualization, On the Horizon
Martim Carbone, Diego Zamboni, Wenke Lee, "Taming Virtualization", IEEE Security & Privacy, vol.6, no. 1, pp. 65-67, January/February 2008, doi:10.1109/MSP.2008.24
1. A. Seshadri et al., "Secvisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes," Proc. 21st ACM Symp. Operating Systems Principles, ACM Press, 2007, pp. 335–350.
2. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection-Based Architecture for Intrusion Detection," Proc. 2003 Network and Distributed Systems Symp., Internet Soc., 2003, pp. 191–206.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool