The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization of embedded systems has recently been in the spotlight especially because of the numerous advantages it can bring. Among these, the improvement of software design quality can be highlighted, since legacy software can be reused along with newer applications, easing newer and older systems' integration. Also, security concerned systems can enjoy the gains of virtualization: two Operating...
Cloud service providers (CSPs) should institute the necessary security controls, including restricting physical and logical access to hyper visor and other forms of employed virtualization layers. To enact relevant security measures, the core elements communicating with the hyper visor need to be secured. A proposed security model will introduce some of the aspects that need to be secured in the virtual...
Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure API's, and malicious inside users are applicable to cloud computing environment as well. In this paper, the authors consider a cloud computing service where multiple Virtual Machines...
Server consolidation through virtualization is becoming an effective way to save power and space in enterprise data centers. However, it also brings additional operational risks for the consolidated system because the impacts of hardware failures, human errors, and security breaches can be vastly magnified in that densely packed environment. In order to mitigate the above issues, this paper proposes...
As Information Security Professionals we are often thought of as the individuals who implement the necessary technologies to protect the organization. Sometime as InfoSec professionals we are too paranoid about security that we tend to bend over backwards to protect information at ANY cost. Cost is a delineating factor in the protecting the confidentially, integrity and availability of information...
Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system, storage, and network) became important again...
High assurance MILS and MLS systems require strict limitation of the interactions between different security compartments based on a security policy. Virtualization can be used to provide a high degree of separation in such systems. Even with perfect isolation, however, the I/O devices are shared between different security compartments. Among the I/O controllers, the graphics subsystem is the largest...
Server virtualization is a key technology for today's data centers, allowing dedicated hardware to be turned into resources that can be used on demand.However, in spite of its important role, the overall security impact of virtualization is not well understood.To remedy this situation, we have performed a systematic literature review on the security effects of virtualization. Our study shows that,...
In residential environments, a home gateway platform can offer services that are configurable by a user depending on current needs or preferences. Gateway devices are very often managed by a service provider or an access provider to enhance performance or guarantee QoS. Assuming a multi-provider and/or multi-user scenario, a secure framework has to maintain security and privacy between different gateway...
Problems of overall safety management, appropriate load balance, and the need for easy-to-use emerge in an environment containing multiple trusted virtualized platforms. We proposed the generalized trusted virtualized platform architecture, GTVP, which combines multiple physical platforms as a trusted union. GTVP first establishes trust relationship among all platforms, and then synchronizes their...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor...
Virtualization trims administrative overhead, eases system management, and combats OS-level security vulnerabilities. However, it also exhibits new characteristics and exposes new vulnerabilities that can be detrimental to securing the system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.