Virtual machine introspection

Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)

    Abstract

    Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVM
    monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
    Original languageEnglish
    Title of host publicationSIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
    Place of PublicationNew York
    PublisherAssociation for Computing Machinery (ACM)
    Pages405-410
    Number of pages6
    ISBN (Print)9781450330336
    DOIs
    Publication statusPublished - Sep 2014

    Keywords

    • virtual machine introspection
    • virtualization security
    • virtualization
    • cloud computing

    Fingerprint

    Dive into the research topics of 'Virtual machine introspection'. Together they form a unique fingerprint.

    Cite this