Abstract
Virtualization is the dominant technology employed in enterprise data centers and those used for offering cloud computing services. This technology has resulted in what is called a virtualized infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Any mention of commercial products or organizations is for informational purposes only; it is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the products identified are necessarily the best available for the purpose.
.
References
Chandramouli, R.: Security Recommendations for Hypervisor Deployment on Servers. NIST Special Publication SP 800-125A. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125A.pdf
Heap-based buffer overflow in the IDE subsystem in QEMU, January 2018. https://www.cvedetails.com/cve/CVE-2015-5154
Allowing guest OS users to execute arbitrary code on the host OS, January 2018. https://www.cvedetails.com/cve/CVE-2015-3214
Hetzelt, F., Buhren, R.: Security analysis of encrypted virtual machines. In: Proceedings of the13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE 2017), Xi’an, China, April 2017 (2017)
Chandramouli, R.: Secure Virtual Network Configuration for Virtual Machine (VM) Protection. NIST Special Publication SP 800-125B. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf
Shirinbab, S., Lundberg, I., Illie, D.: Performance comparison of KVM, VMware and XenServer using a Large Telecommunication Application. In: Proceedings of the Fifth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING) (2014)
Intel Software Guard Extensions (Intel SGX), January 2018. https://software.intel.com/en-us/sgx
Kaplan, D., Powell, J., Woller, T.: White Paper AMD Memory Encryption, January 2018. http://amd-dev.wpengine.netdna-cdn.dom/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf
Trusted Platform Module (TPM) Main Specification. http://www.trustedcomputinggroup.org/resources/tpm_main_specification
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 This is a U.S. government work and its text is not subject to copyright protection in the United States; however, its text may be subject to foreign copyright protection
About this chapter
Cite this chapter
Chandramouli, R. (2018). Comprehensive Security Assurance Measures for Virtualized Server Environments. In: Samarati, P., Ray, I., Ray, I. (eds) From Database to Cyber Security. Lecture Notes in Computer Science(), vol 11170. Springer, Cham. https://doi.org/10.1007/978-3-030-04834-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-04834-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04833-4
Online ISBN: 978-3-030-04834-1
eBook Packages: Computer ScienceComputer Science (R0)