DocumentCode :
1092570
Title :
Ghost in the Virtual Machine
Author :
Arce, Iván
Author_Institution :
Core Security Technologies
Volume :
5
Issue :
4
fYear :
2007
Firstpage :
68
Lastpage :
71
Abstract :
Past and present experiences point to a seemingly invariant conclusion: virtualization continues to be a promising technology to address information security needs, but it will also continue to fall short of delivering on the ideal of a robust, trustworthy, and mythically flawless computing environment. As the trend toward virtualization accelerates and the technology becomes available to larger user communities at lower costs, the information security community will benefit from the additional hands-on experience to improve security tools and techniques. But malicious attackers certainly won´t be spectators in the advancements of those security toolkits. As security practitioners, it´s paramount that we adopt a practical and realistic approach to the new wave of virtualization, that we assess the risks with precision, and help align expectations accordingly.
Keywords :
security of data; virtual machines; information security; security tools; virtual machine; virtualization; Concurrent computing; Costs; Hardware; Instruction sets; Privacy; Resource management; Resource virtualization; Space technology; Virtual machining; Voice mail; attacks; hypervisoring; virtual machines; virtualization;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2007.83
Filename :
4288049
Link To Document :
بازگشت