Please use this identifier to cite or link to this item:
http://idr.nitk.ac.in/jspui/handle/123456789/6913
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jayaraju, L. | |
dc.contributor.author | Naik, D. | |
dc.contributor.author | Mohan, B.R. | |
dc.date.accessioned | 2020-03-30T09:46:23Z | - |
dc.date.available | 2020-03-30T09:46:23Z | - |
dc.date.issued | 2013 | |
dc.identifier.citation | 2013 4th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2013, 2013, Vol., , pp.- | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/6913 | - |
dc.description.abstract | Virtualization is rapidly gaining acceptance as a fundamental building block in enterprise data centers and is the core component of cloud computing platforms. It is most known for improving efficiency and ease of management. While this technology is meant to enhance the security of computer systems, some recent attacks show that virtual machine technology has much vulnerability and becomes exposed to security threats. In this paper, we focus on Vulnerability Analysis on Virtualized Environment using First Principles Vulnerability Analysis (FPVA) methodology. This paper analyses the security of Interrupt Descriptor Table on Xen hypervisor and presents outcome of analysis. This paper aids other enthusiasts in better analysing the Security aspects of Xen system using their own programs for security vulnerabilities. � 2013 IEEE. | en_US |
dc.title | Vulnerability analysis on virtualized environment using FPVA | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.