Abstract
Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVM
monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
Original language | English |
---|---|
Title of host publication | SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks |
Place of Publication | New York |
Publisher | Association for Computing Machinery (ACM) |
Pages | 405-410 |
Number of pages | 6 |
ISBN (Electronic) | 9781450330336 |
ISBN (Print) | 9781450330336 |
DOIs | |
Publication status | Published - Sept 2014 |
Event | The 7th International Conference on Security of Information and Networks (SIN'14) - Glasgow, United Kingdom Duration: 9 Sept 2014 → 11 Sept 2014 http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=37220©ownerid=63415 (Link to conference website.) |
Conference
Conference | The 7th International Conference on Security of Information and Networks (SIN'14) |
---|---|
Abbreviated title | SIN'14 |
Country/Territory | United Kingdom |
City | Glasgow |
Period | 9/09/14 → 11/09/14 |
Internet address |
|
Keywords
- virtual machine introspection
- virtualization security
- virtualization
- cloud computing