Virtual machine introspection

Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVM
    monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
    Original languageEnglish
    Title of host publicationSIN 14 Conf
    Subtitle of host publicationProceedings of the 7th International Conference on Security of Information and Networks
    Place of PublicationNew York
    PublisherACM
    Pages405-410
    Number of pages6
    ISBN (Print)978-1-4503-3033-6
    DOIs
    Publication statusPublished - Sep 2014

    Keywords

    • virtual machine introspection
    • virtualization security
    • virtualization
    • cloud computing

    Fingerprint Dive into the research topics of 'Virtual machine introspection'. Together they form a unique fingerprint.

    Cite this