Virtualization

A Virtualization Architecture for In-Depth Kernel Isolation

Download Now Free registration required

Executive Summary

Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolation and management. Unfortunately, virtualization solutions incur performance overhead. The magnitude of this overhead is directly proportional to the extend of virtualization they offer: full virtualization incurs an additional indirection layer to interface with the ever increasing hardware devices.

  • Format: PDF
  • Size: 519.9 KB