The Analysis of the Virtual Machine Security
Downloads
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In these conditions we present the idea of using a virtual machine to share services and information over the Internet. In case of an attack the virtual machine resources will be affected while the real machine resources will be safe. In this paper, we assume the perspective of the attacker, who is trying to run malicious software over a virtual machine. We’ll want to show that if we gain the full control over a virtual machine, we can’t affect the real machine resources.
Downloads
Disa, Department of defence of United State of America, Security technical implementation guide about virtual machine.
Bernaschi, M., Grabrielli, E., Mancini, L. “Operating System Enhancements to Prevent the Misuse of System Calls”, Proceedings of the ACM Conference on Computer and Communications Security.
Blunden, B. “Virtual Machine Design and Implementation in C/C++”, Wordware Publ. Plano,Texas – USA.
Chen, P., Noble, B. “When Virtual Is Better Than Real”, Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS).
Garfinkel, T., Rosenblum, M. “A Virtual Machine Introspection Based Architecture for Intrusion Detection”, Proceedings of the Network and Distributed System Security Symposium (NDSS).
Goldberg, R. “Architecture of Virtual Machines”, AFIPS National Computer Conference. New York – NY– USA.
King, S., Dunlap, G., Chen, P. “Operating System Support for Virtual Machines”.
Sugerman, J., Ganesh, V., Beng-Hong L. (2001). Virtualizing I/O Devices on VMware Workstation’s Hosted Virtual Machine Monitor.
Vmware Emulator. http://www.vmware.com.




