A Review of Virtual Machine Attack Based on Xen
Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recentl...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2016-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | http://dx.doi.org/10.1051/matecconf/20166103003 |
_version_ | 1830352700565356544 |
---|---|
author | Ren xun-yi Zhou yu-qi |
author_facet | Ren xun-yi Zhou yu-qi |
author_sort | Ren xun-yi |
collection | DOAJ |
description | Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recently. Base on this paper can provide a reference for the further research on the security of virtual machine. |
first_indexed | 2024-12-20T01:01:22Z |
format | Article |
id | doaj.art-1f3718f0263c400e95b0af1a9f4e36e2 |
institution | Directory Open Access Journal |
issn | 2261-236X |
language | English |
last_indexed | 2024-12-20T01:01:22Z |
publishDate | 2016-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | MATEC Web of Conferences |
spelling | doaj.art-1f3718f0263c400e95b0af1a9f4e36e22022-12-21T19:58:58ZengEDP SciencesMATEC Web of Conferences2261-236X2016-01-01610300310.1051/matecconf/20166103003matecconf_apop2016_03003A Review of Virtual Machine Attack Based on XenRen xun-yi0Zhou yu-qi1College of Computer Nanjing University of Posts and TelecommunicationsCollege of Computer Nanjing University of Posts and TelecommunicationsVirtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recently. Base on this paper can provide a reference for the further research on the security of virtual machine.http://dx.doi.org/10.1051/matecconf/20166103003 |
spellingShingle | Ren xun-yi Zhou yu-qi A Review of Virtual Machine Attack Based on Xen MATEC Web of Conferences |
title | A Review of Virtual Machine Attack Based on Xen |
title_full | A Review of Virtual Machine Attack Based on Xen |
title_fullStr | A Review of Virtual Machine Attack Based on Xen |
title_full_unstemmed | A Review of Virtual Machine Attack Based on Xen |
title_short | A Review of Virtual Machine Attack Based on Xen |
title_sort | review of virtual machine attack based on xen |
url | http://dx.doi.org/10.1051/matecconf/20166103003 |
work_keys_str_mv | AT renxunyi areviewofvirtualmachineattackbasedonxen AT zhouyuqi areviewofvirtualmachineattackbasedonxen AT renxunyi reviewofvirtualmachineattackbasedonxen AT zhouyuqi reviewofvirtualmachineattackbasedonxen |