Virtualization and Security: Happily Ever After?
Title | Virtualization and Security: Happily Ever After? |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Xu, Dongyan |
Conference Name | Proceedings of the 4th ACM Conference on Data and Application Security and Privacy |
Publisher | ACM |
Conference Location | San Antonio, Texas, USA |
ISBN Number | 978-1-4503-2278-2 |
Keywords | system and network security, Trusted Computing, virtualization |
Abstract | Virtualization has been a major enabling technology for improving trustworthiness and tamper-resistance of computer security functions. In the past decade, we have witnessed the development of virtualization-based techniques for attack/malware monitoring, detection, prevention, and profiling. Virtual platforms have been widely adopted for system security experimentation and evaluation, because of their strong isolation, maneuverability, and scalability properties. Conversely, the demand from security research has led to significant advances in virtualization technology itself, for example, in the aspects of virtual machine introspection, check-pointing, and replay. In this talk, I will present an overview of research efforts (including our own) in virtualization-based security and security-driven virtualization. I will also discuss a number of challenges and opportunities in maintaining and elevating the synergies between virtualization and security. |
URL | http://doi.acm.org/10.1145/2557547.2557590 |
DOI | 10.1145/2557547.2557590 |
Citation Key | Xu:2014:VSH:2557547.2557590 |