![Virtual Machine Introspection with Xen on ARM](https://writelatex.s3.amazonaws.com/published_ver/1283.jpeg?X-Amz-Expires=14400&X-Amz-Date=20250205T064051Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20250205/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7c1db8403757923cd4946d1b517df51e506982be1c473c58746e886dea8cc6fc)
Virtual Machine Introspection with Xen on ARM
Forfatter:
Tamas Lengyel
Sidst opdateret:
10 år siden
Licens:
Creative Commons CC BY 4.0
Resumé:
In the recent years, virtual machine introspection (VMI) has become a valuable technique for developing security applications for virtualized environments. With the increasing popularity of the ARM architecture, and the recent addition of hardware virtualization extensions, there is a growing need for porting existing VMI tools. Porting these applications requires proper hypervisor support, which we have been implementing for the upcoming release of the Xen hypervisor.
![Virtual Machine Introspection with Xen on ARM](https://writelatex.s3.amazonaws.com/published_ver/1283.jpeg?X-Amz-Expires=14400&X-Amz-Date=20250205T064051Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20250205/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7c1db8403757923cd4946d1b517df51e506982be1c473c58746e886dea8cc6fc)
\begin
Opdag hvorfor 18 millioner mennesker verden rundt stoler på Overleaf med deres arbejde.