|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Securing Virtual Machine Monitors: What is Needed?
If you have a question about this talk, please contact Eiko Yoneki.
While many people view virtual machine monitors as something special and different, in realty they are just special purpose operating systems. The major difference is that the API to a virtual machine monitor is the instruction set of the virtual machine, while the API to an operating system is a set of system calls to manipulate processes, file systems, perform I/O, etc. To the extent that a particular VMM uses paravirtualization, it begins to look more like a classical operating system than a VMM —and just like operating systems, VMMs can have exploitable security vulnerabilities.
This talk will discuss the myths and reality behind virtualization and security, and look at what is needed to build truly secure VMMs.
This talk is part of the Computer Laboratory Systems Research Group Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other lists"See Naples and Dial - An italian Job" Visual Rhetoric and modern South Asian history (2014) Butterfly Genetics Group Lab Meeting
Other talksSea monsters to sonar: mapping the Polar oceans Enigmas of Erebus: observations of an active lava lake Myeloid lineage switch in pro-B cells generates novel M phi subsets during homeostasis & inflammation Webinars for Professional Development in the Arts Series 8: "A neuropsychological case study of two chromesthetic musicians" Unconventional Superconductivity in Quantum-Dot Systems A control theoretic approach to the linear Boltzmann equation