Ghost in the Virtual Machine

  • Authors:
  • Ivan Arce

  • Affiliations:
  • Core Security Technologies

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Virtual machines and virtualization technologies aren't new to the computing world--they've been used for at least 40 years. Recently, the availability of virtualization software for low-cost computer equipment and the promise of both tangible reductions on total cost of ownership and rapid return on investment on virtualization projects have moved many organizations to adopt it as a key component of their IT strategy. In this installment of Attack Trends, I'll look at this technology trend with an eye toward security and analyze past and present advances in offensive security tools and techniques