Title
Ghost in the Virtual Machine
Authors
Ivan Arce
In
IEEE Security and Privacy, vol.5, no.4, pp.68-71, Jul/Aug, 2007
Date published
2007-09
Keywords
virtual machines, ghosts.

Abstract

Virtual machines and virtualization technologies aren't new to the computing world--they've been used for at least 40 years. Recently, the availability of virtualization software for low-cost computer equipment and the promise of both tangible reductions on total cost of ownership and rapid return on investment on virtualization projects have moved many organizations to adopt it as a key component of their IT strategy. In this installment of Attack Trends, I'll look at this technology trend with an eye toward security and analyze past and present advances in offensive security tools and techniques.

Attachments