With this discussion of virtualization and security, it might be a
good time to note:
IEEE Security & Privacy
Special issue on virtualization
September/October 2008
Deadline for submissions: 6 February 2008
Visit www.computer.org/portal/pages/security/author.xml to submit a
manuscript
Guest editors: Samuel T. King (UIUC), Sean W. Smith (Dartmouth)
Virtualization has several properties that make it useful for
security applications. Traditional virtual machine monitors aspire
to enforce strong isolation among multiple operating systems (OSes)
running on the same physical hardware, enable software services to
be implemented below the OS at a layer usually only accessible by
hardware, and provide low-level software with convenient
abstractions of the virtual machineís hardware resources. Other
approaches aspire to provide multiple virtual but isolated images
of the same OS installation. These properties helped foster a new
class of virtual-machine- based security services and made
virtualization a staple of many enterprise computing environments.
A common topic in the early days of computing, virtualization has
recently seen a resurgence of commercial and research interest.
Consequently, the security implications of virtualization
technology are the topic of the Sept./Oct. 2008 special issue of
IEEE Security & Privacy magazine. We are looking for feature
articles with an in-depth coverage of topics related to
virtualization technology and how it applies to security. Among the
potential topics are:
--Virtualization for intrusion detection
--Virtualization for forensic analysis of compromised computer systems
--Virtualization for analyzing malicious software
--Hardware support for secure virtualization
--Security interfaces between VMMs and operating systems
--Securing applications using virtualization
--Securing attacks using virtualization
--Security analysis of virtualization
The above list is neither complete nor closed. Authors are
encouraged to submit articles that explore other aspects of
virtualization and its application to security. Submissions will be
subject to the peer-review methodology for refereed papers.
Articles should be understandable to a broad audience of people
interested in security and privacy. The writing should be down to
earth, practical, and original. Authors should not assume that the
audience will have specialized experience in a particular subfield.
All accepted articles will be edited according to the IEEE Computer
Society style guide.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]