Security

When Virtual Is Better Than Real

Download Now Free registration required

Executive Summary

This position paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine. This structure enables services to be added below the operating system and to do so without trusting or modifying the operating system or applications. To demonstrate the usefulness of this structure, the authors describe three services that take advantage of it: Secure logging, intrusion prevention and detection, and environment migration. First proposed and used in the 1960s, virtual machines are experiencing a revival in the commercial and research communities.

  • Format: PDF
  • Size: 38.3 KB