Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Virtualization and Hardware-Based Security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Perez, R. ; IBM T.J. Watson Res. Center, Yorktown Heights, NY ; van Doorn, L. ; Sailer, R.

Hypervisors allow virtualization at the hardware level. These technologies have security-related strengths as well as weaknesses. The authors examine emerging hardware and software virtualization technologies in the context of modern computing environments and requirements.

Published in:

Security & Privacy, IEEE  (Volume:6 ,  Issue: 5 )