2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) 2017
DOI: 10.1109/cybersa.2017.8073397
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for testing virtualisation security

Abstract: There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus reducing hardware costs. However, vulnerabilities in the hypervisor layer have an impact on any virtual machines running on top, making security an important part of virtualisation. In this paper, we evaluate the security of virtualisation, including detection a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In [16] the author reasons to collect all of the required records to comfort the information earlier than real assault consequences of the system, at some point of the port scanning and various sports were completed ultimately where the report could be made to verify the development of the device to be a more secure purpose. In [17] the authors, being able to certify and verify the communication of the security level within a certain device is crucial for his or her acceptance.…”
Section: Related Workmentioning
confidence: 99%
“…In [16] the author reasons to collect all of the required records to comfort the information earlier than real assault consequences of the system, at some point of the port scanning and various sports were completed ultimately where the report could be made to verify the development of the device to be a more secure purpose. In [17] the authors, being able to certify and verify the communication of the security level within a certain device is crucial for his or her acceptance.…”
Section: Related Workmentioning
confidence: 99%