virtualizaton and security cfp (was Re: Death of antivirus software imminent)

Sean W. Smith sws at cs.dartmouth.edu
Thu Jan 3 09:00:12 EST 2008


With this discussion of virtualization and security, it might be a  
good time to note:


>
>
> IEEE Security & Privacy
> Special issue on virtualization
> September/October 2008
>
> Deadline for submissions: 6 February 2008
>
> Visit www.computer.org/portal/pages/security/author.xml to submit a  
> manuscript
> Guest editors: Samuel T. King (UIUC), Sean W. Smith (Dartmouth)
>
> Virtualization has several properties that make it useful for  
> security applications. Traditional virtual machine monitors aspire  
> to enforce strong isolation among multiple operating systems (OSes)  
> running on the same physical hardware, enable software services to  
> be implemented below the OS at a layer usually only accessible by  
> hardware, and provide low-level software with convenient  
> abstractions of the virtual machineís hardware resources. Other  
> approaches aspire to provide multiple virtual but isolated images  
> of the same OS installation. These properties helped foster a new  
> class of virtual-machine- based security services and made  
> virtualization a staple of many enterprise computing environments.
>
> A common topic in the early days of computing, virtualization has  
> recently seen a resurgence of commercial and research interest.  
> Consequently, the security implications of virtualization  
> technology are the topic of the Sept./Oct. 2008 special issue of  
> IEEE Security & Privacy magazine. We are looking for feature  
> articles with an in-depth coverage of topics related to  
> virtualization technology and how it applies to security. Among the  
> potential topics are:
>
> --Virtualization for intrusion detection
> --Virtualization for forensic analysis of compromised computer systems
> --Virtualization for analyzing malicious software
> --Hardware support for secure virtualization
> --Security interfaces between VMMs and operating systems
> --Securing applications using virtualization
> --Securing attacks using virtualization
> --Security analysis of virtualization
>
> The above list is neither complete nor closed. Authors are  
> encouraged to submit articles that explore other aspects of  
> virtualization and its application to security. Submissions will be  
> subject to the peer-review methodology for refereed papers.  
> Articles should be understandable to a broad audience of people  
> interested in security and privacy. The writing should be down to  
> earth, practical, and original. Authors should not assume that the  
> audience will have specialized experience in a particular subfield.  
> All accepted articles will be edited according to the IEEE Computer  
> Society style guide.
>

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list