News Updates Monday 25th Nov 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Exposition of Solutions to Hypervisor Vulnerabilities


Author : Bhavini Kanoongo, Puja Jagani , Parth Mehta and Lakshmi Kurup

Pages : 3244-3247
Download PDF
Abstract

With the breakthroughs in VLSI technology and accumulative throughput of every device of the servers, there are huge amounts of computing power that could not be exploited completely or in an optimized way. By employing adequate utilization of hardware resources, virtualization technique has solved this problem. Virtualization is nothing but to abstract computer resources. It generates a virtual environment by separating user and applications from the distinct hardware features used by them to execute their task. The goal of developing a virtual environment is to enhance resource usage by aggregating miscellaneous and autonomous resources. Though the popularity of virtual machines is rising and they are being extensively adopted, the concept is however not new. A layer bounded by OS and the concealed hardware, is the omnipotent hypervisor which is the fundamental element of virtualization. It supervises the physical platform and accesses its entire resource set which consists of the memory allocated to the guest virtual machines (VMs). Not only as a medium of isolation and inspection, but also from the security point of view hypervisors, are extremely prominent. Using various architectures such as the HyperWall, NoHype and Coordinated IDS/IPS approach, we review the various solutions to tackle the threats associated with Hypervisor-secure virtualization.

Keywords: Cloud Computing, Hardware Security, Hypervisor Security, Integrity, Virtualization

Article published in International Journal of Current Engineering and Technology, Vol.4, No.5 (Oct-2014)

 

 

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved