virtualizaton and security cfp (was Re: Death of antivirus software imminent)
Sean W. Smith
sws at cs.dartmouth.edu
Thu Jan 3 09:00:12 EST 2008
With this discussion of virtualization and security, it might be a
good time to note:
>
>
> IEEE Security & Privacy
> Special issue on virtualization
> September/October 2008
>
> Deadline for submissions: 6 February 2008
>
> Visit www.computer.org/portal/pages/security/author.xml to submit a
> manuscript
> Guest editors: Samuel T. King (UIUC), Sean W. Smith (Dartmouth)
>
> Virtualization has several properties that make it useful for
> security applications. Traditional virtual machine monitors aspire
> to enforce strong isolation among multiple operating systems (OSes)
> running on the same physical hardware, enable software services to
> be implemented below the OS at a layer usually only accessible by
> hardware, and provide low-level software with convenient
> abstractions of the virtual machineís hardware resources. Other
> approaches aspire to provide multiple virtual but isolated images
> of the same OS installation. These properties helped foster a new
> class of virtual-machine- based security services and made
> virtualization a staple of many enterprise computing environments.
>
> A common topic in the early days of computing, virtualization has
> recently seen a resurgence of commercial and research interest.
> Consequently, the security implications of virtualization
> technology are the topic of the Sept./Oct. 2008 special issue of
> IEEE Security & Privacy magazine. We are looking for feature
> articles with an in-depth coverage of topics related to
> virtualization technology and how it applies to security. Among the
> potential topics are:
>
> --Virtualization for intrusion detection
> --Virtualization for forensic analysis of compromised computer systems
> --Virtualization for analyzing malicious software
> --Hardware support for secure virtualization
> --Security interfaces between VMMs and operating systems
> --Securing applications using virtualization
> --Securing attacks using virtualization
> --Security analysis of virtualization
>
> The above list is neither complete nor closed. Authors are
> encouraged to submit articles that explore other aspects of
> virtualization and its application to security. Submissions will be
> subject to the peer-review methodology for refereed papers.
> Articles should be understandable to a broad audience of people
> interested in security and privacy. The writing should be down to
> earth, practical, and original. Authors should not assume that the
> audience will have specialized experience in a particular subfield.
> All accepted articles will be edited according to the IEEE Computer
> Society style guide.
>
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list