Virtualization and Hardware-Based Security

Copyright © (2008) by IEEE. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distrubuted for profit. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee.

Hypervisor-based virtualization technologies are frequently mentioned in regard to both their security-related strengths and their weaknesses. We examine emerging hardware and software virtualization technologies in the context of modern computing environments and requirements, keeping in mind the history of these technologies in order to fully appreciate them as we also outline future directions in this space.

By: Ronald Perez; Leendert van Doorn; Reiner Sailer

Published in: IEEE Security & Privacy, volume 6, (no 5 ), pages 24-31 in 2008

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc24590.pdf

Questions about this service can be mailed to reports@us.ibm.com .