SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Compatibility is not transparency: VMM detection myths and realities
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Hi-index | 0.00 |
Endpoint security used to be easy - green screen terminals were heavy, cumbersome, and fixed to the floor. All that has changed, and it is now increasingly difficult for organisations to identify what is an endpoint, as they range from desktops to laptops to iPods. Securing devices that are highly portable and mobile presents challenges to organisations. While the technical solutions are largely understood, the main difficulty lies in adopting a comprehensive yet practical approach to securing a highly heterogeneous and dynamic technical environment.