The use of hardware virtualization in the context of information security


The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and… (More)
DOI: 10.1134/S0361768812050064


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.