The Analysis of the Virtual Machine Security

virtual machine, denial of service, malware, cybersecurity

Authors

  • Alexandru MIHALACHE
    alex_mihalache@gmail.com (Primary Contact)
    University Politehnica of Bucharest
2016-04-29

Downloads

Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In these conditions we present the idea of using a virtual machine to share services and information over the Internet. In case of an attack the virtual machine resources will be affected while the real machine resources will be safe. In this paper, we assume the perspective of the attacker, who is trying to run malicious software over a virtual machine. We’ll want to show that if we gain the full control over a virtual machine, we can’t affect the real machine resources.