A Review of Virtual Machine Attack Based on Xen

Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recentl...

Full description

Bibliographic Details
Main Authors: Ren xun-yi, Zhou yu-qi
Format: Article
Language:English
Published: EDP Sciences 2016-01-01
Series:MATEC Web of Conferences
Online Access:http://dx.doi.org/10.1051/matecconf/20166103003
_version_ 1830352700565356544
author Ren xun-yi
Zhou yu-qi
author_facet Ren xun-yi
Zhou yu-qi
author_sort Ren xun-yi
collection DOAJ
description Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recently. Base on this paper can provide a reference for the further research on the security of virtual machine.
first_indexed 2024-12-20T01:01:22Z
format Article
id doaj.art-1f3718f0263c400e95b0af1a9f4e36e2
institution Directory Open Access Journal
issn 2261-236X
language English
last_indexed 2024-12-20T01:01:22Z
publishDate 2016-01-01
publisher EDP Sciences
record_format Article
series MATEC Web of Conferences
spelling doaj.art-1f3718f0263c400e95b0af1a9f4e36e22022-12-21T19:58:58ZengEDP SciencesMATEC Web of Conferences2261-236X2016-01-01610300310.1051/matecconf/20166103003matecconf_apop2016_03003A Review of Virtual Machine Attack Based on XenRen xun-yi0Zhou yu-qi1College of Computer Nanjing University of Posts and TelecommunicationsCollege of Computer Nanjing University of Posts and TelecommunicationsVirtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recently. Base on this paper can provide a reference for the further research on the security of virtual machine.http://dx.doi.org/10.1051/matecconf/20166103003
spellingShingle Ren xun-yi
Zhou yu-qi
A Review of Virtual Machine Attack Based on Xen
MATEC Web of Conferences
title A Review of Virtual Machine Attack Based on Xen
title_full A Review of Virtual Machine Attack Based on Xen
title_fullStr A Review of Virtual Machine Attack Based on Xen
title_full_unstemmed A Review of Virtual Machine Attack Based on Xen
title_short A Review of Virtual Machine Attack Based on Xen
title_sort review of virtual machine attack based on xen
url http://dx.doi.org/10.1051/matecconf/20166103003
work_keys_str_mv AT renxunyi areviewofvirtualmachineattackbasedonxen
AT zhouyuqi areviewofvirtualmachineattackbasedonxen
AT renxunyi reviewofvirtualmachineattackbasedonxen
AT zhouyuqi reviewofvirtualmachineattackbasedonxen