|
In
conjunction with the ACM Conference on Computer & Communications
Security
Location: GMU Johnson
Center Room G (Campus
Map)
This workshop, the first of its kind to deal exclusively with virtual
machine security, will tackle the important research topics in
virtualization security. Virtualization has seen an explosion in growth
in deployment, implementations, and applications. Virtualization holds
unique properties that make it attractive for security including
isolation, compartmentalization, live state capture, and replay.
Virtualization has been used to study malicious software as well as to
prevent malicious software infection. In addition, virtualization
itself is now the subject of attack. This workshop aims to bring
together leading researchers in the fields of virtualization and
security to present the latest work on these topics.
Important
Dates
Paper submission
deadline: June 2, 2008 June
9th, 2008 (Extended)
Paper acceptance or rejection: July 10, 2008 July 27th, 2008
Final paper camera-ready copy: August 5, 2008 August 10th, 2008
Scope and topics
• Applications of virtualization for security
• Security and integrity of virtual machines
• Detecting virtualization
• Evading virtualization
• Trapping malicious code via virtualization
• Economic implications of virtualization
• Attacks and vulnerabilities against virtualization environments
• Honey Nets and Honey Client architectures, systems, and results
• Management and control of virtual machine farms for security
• Forensics using virtualization
• Enhancing privacy and anonymity using virtualization
• Measuring security and performance of virtualization
• Instrumentation and control of virtualization
• Performance optimization of virtual machines
• Performance and security analysis of lightweight virtualization
• Virtualization for mobile devices
• Vulnerabilities in virtualization environments
|