Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Virtual Machine Introspection

Win, Thu Yein, Tianfield, Huaglory, Mair, Quentin, Al Said, Taimur and Rana, Omer Farooq 2014. Virtual Machine Introspection. Presented at: 7th International Conference on Security of Information and Networks, Glasgow, UK, 9-11 September 2014. SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks. ACM, p. 405. 10.1145/2659651.2659710

Full text not available from this repository.

Abstract

Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.

Item Type: Conference or Workshop Item (Paper)
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Publisher: ACM
ISBN: 978145033033-6
Funders: EPSRC
Last Modified: 22 Sep 2018 21:24
URI: http://orca.cf.ac.uk/id/eprint/78655

Citation Data

Cited 3 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item