Corpus ID: 935746

Virtualization: A double-edged sword

@article{Wlodarz2007VirtualizationAD,
  title={Virtualization: A double-edged sword},
  author={J. J. Wlodarz},
  journal={ArXiv},
  year={2007},
  volume={abs/0705.2786}
}
Virtualization became recently a hot topic once again, after being dormant for more than twenty years. In the meantime, it has been almost forgotten, that virtual machines are not so perfect isolating environments as it seems, when looking at the principles. These lessons were already learnt earlier when the first virtualized systems have been exposed to real life usage. Contemporary virtualization software enables instant creation and destruction of virtual machines on a host, live migration… Expand
Virtualization: Issues, security threats, and solutions
TLDR
The security considerations and some associated methodologies by which security breaches can occur are explained, recommendations for how virtualized environments can best be protected are offered, and a set of generalized recommendations that can be applied to achieve secure virtualized implementations are offered. Expand
REAL SECURITY IN VIRTUAL SYSTEMS: A PROPOSED MODEL FOR A COMPREHENSIVE APPROACH TO SECURING VIRTUALIZED ENVIRONMENTS
Corporate adoption of new server virtualization technologies offered by VMWare, Microsoft, the open source community (Xen) and others raises both new opportunities and new risks for system security.Expand
An Analysis of Hardware-Assisted Virtual Machine Based Rootkits
TLDR
This thesis analyzes and compares the source code for both AMD-V and Intel VT-x implementations of Blue Pill to identify commonalities in the respective versions' attack methodologies from both a functional and technical perspective, and concludes that their functional implementations are nearly identical; but their technical implementations are very different. Expand
Virtio network paravirtualization driver: Implementation and performance of a de-facto standard
TLDR
In this paper, the network virtualization done by the Kernel-based Virtual Machine (KVM) is described, and some performance results of web benchmark on the two models are presented. Expand
Reinventing virtual appliances
TLDR
The design and prototype of an extendable management framework, virtualization integrator (VSI), is described, which enables an appliance builder to easily fulfill the key features of virtual appliances and coordinate management function across components located in multiple virtual appliances. Expand
Survey on Virtual Appliance-Technology , Merits and Case Studies
TLDR
This paper is aimed to help the future researchers in the field of the virtual appliance by providing them most of the details they require. Expand
Simplifying Service Deployment with Virtual Appliances
TLDR
The results show virtual appliances offer significant advantages for service deployment by making the deployment process much simpler and easier, even for the deployment of advanced enterprise services. Expand
A novel architecture for identity management system using virtual appliance technology
TLDR
A novel architecture that integrates the Identity management system together with virtual appliance technology to reduce the overall deployment time of the system and results have shown that there is decrease in deployment time and decrease in number of steps required in previous architecture. Expand
Engineering Machine Translation for Deployment on Cloud
TLDR
An approach to make MapReduce framework applicable for computationally intensive application like MT system, which helps to enhance the throughput of MT system uniformly by deploying it on large cluster of physical or virtual machines is described. Expand
Machine Translation System as Virtual Appliance: For Scalable Service Deployment on Cloud
TLDR
This paper proposes that every software version of a complex NLP application like MT system should be built and released as a virtual appliance that can be deployed with a very little setup time and with ease even by a common user. Expand
...
1
2
...

References

SHOWING 1-10 OF 43 REFERENCES
A comparison of software and hardware techniques for x86 virtualization
TLDR
It is found that the hardware support for Virtual Machine Monitors for x86 fails to provide an unambiguous performance advantage for two primary reasons: first, it offers no support for MMU virtualization; second, it fails to co-exist with existing software techniques for MM U virtualization. Expand
Seamless live migration of virtual machines over the MAN/WAN
The "VM Turntable" demonstrator at iGRID 2005 pioneered the integration of Virtual Machines (VMs) with deterministic "lightpath" network services across a MAN/WAN. The results provide for a new stageExpand
Live migration of virtual machines
TLDR
The design options for migrating OSes running services with liveness constraints are considered, the concept of writable working set is introduced, and the design, implementation and evaluation of high-performance OS migration built on top of the Xen VMM are presented. Expand
sHype : Secure Hypervisor Approach to Trusted Virtualized Systems
We present an operating system independent hypervisor security architecture and its application to control information flow between operating systems sharing a single hardware platform. New computingExpand
Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances
When a personal computer is attacked, both personal data like digital photos and system configuration information like installed programs can be lost. To protect personal data, we house it in a fileExpand
Multi-level security requirements for hypervisors
  • P. Karger
  • Computer Science
  • 21st Annual Computer Security Applications Conference (ACSAC'05)
  • 2005
TLDR
This paper looks at the requirements that users of MLS systems have and discusses their implications on the design of multi-level secure hypervisors. Expand
Virtualization for high-performance computing
TLDR
The trends, motivations, and issues in hardware virtualization with emphasis on their value in HPC environments are discussed. Expand
Building a MAC-based security architecture for the Xen open-source hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high assurance have beenExpand
Towards protecting sensitive files in a compromised system
  • Xin Zhao, Kevin Borders, A. Prakash
  • Computer Science
  • Third IEEE International Security in Storage Workshop (SISW'05)
  • 2005
TLDR
SVFS, a secure virtual file system that uses virtual machine technology to store sensitive files in a virtual machine that is dedicated to providing secure data storage, and run applications in one or more guest virtual machines is proposed. Expand
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor
TLDR
An analysis of the virtualizability of all of the approximately 250 instructions of the Intel Pentium platform and address its ability to support a VMM. Expand
...
1
2
3
4
5
...