Proceedings of the 7th International Conference on Security of Information and Networks 2014
DOI: 10.1145/2659651.2659710
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Machine Introspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…However, shifting the infrastructure from traditional servers to virtualization does not guarantee that the server will avoid potential failures or other new threats. Consequently, the more new features or services will deliver, more potential failures that occur such as Hang (system failure), Denial of Service (DoS), and Malware (Hidden Rootkit) [4] [5]. Virtual Machine Introspection (VMI) is a solution that can be used to solve the problems that occur in virtual machines and create a resilient computing ecosystem.…”
Section: Introductionmentioning
confidence: 99%
“…However, shifting the infrastructure from traditional servers to virtualization does not guarantee that the server will avoid potential failures or other new threats. Consequently, the more new features or services will deliver, more potential failures that occur such as Hang (system failure), Denial of Service (DoS), and Malware (Hidden Rootkit) [4] [5]. Virtual Machine Introspection (VMI) is a solution that can be used to solve the problems that occur in virtual machines and create a resilient computing ecosystem.…”
Section: Introductionmentioning
confidence: 99%