DocumentCode :
1058973
Title :
Taming Virtualization
Author :
Carbone, Martim ; Lee, Wenke ; Zamboni, D.
Author_Institution :
Georgia Inst. of Technol, Atlanta
Volume :
6
Issue :
1
fYear :
2008
Firstpage :
65
Lastpage :
67
Abstract :
Although the term virtualization has been around for decades, only recently has it become a buzzword in the computer systems community with the revival of virtual machines (VMs), driven by efforts in industry and academia. VMs are software entities that emulate a real machine´s functionality; they execute under the control of a hypervisor that virtualizes and multiplexes low-level hardware resources. Hypervisors come in two flavors: non-hosted, which run directly on top of the hardware, and hosted, which are integrated with a host operating system (OS). The presence of a hypervisor makes VMs subject to a level of visibility and control that´s hard to achieve with real machines. The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others.
Keywords :
operating systems (computers); virtual machines; computer system community; low-level hardware resource; operating system; software entity; virtual machine; Computer applications; Computer industry; Electrical equipment industry; Hardware; Mediation; Operating systems; Resource virtualization; Virtual machine monitors; Virtual machining; Voice mail; On the Horizon; VM; hypervisor; virtual machines; virtualization;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2008.24
Filename :
4446700
Link To Document :
بازگشت