TY - GEN
T1 - Security challenges and countermeasures for trusted virtualized computing environments
AU - Brooks, Tyson
AU - Caicedo, Carlos
AU - Park, Joon
PY - 2012
Y1 - 2012
N2 - Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.
AB - Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.
KW - security vulnerabilities
KW - trusted computing
KW - virtual machines
KW - virtualization
UR - http://www.scopus.com/inward/record.url?scp=84867183180&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867183180&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84867183180
SN - 9781908320049
T3 - World Congress on Internet Security, WorldCIS-2012
SP - 117
EP - 122
BT - World Congress on Internet Security, WorldCIS-2012
T2 - World Congress on Internet Security, WorldCIS-2012
Y2 - 10 June 2012 through 12 June 2012
ER -