Hypervisor control: The next phase in the security arms race?
Virtualization

Hypervisor control: The next phase in the security arms race?

Digital security is an ongoing battle of assisted evolution. Every new iteration of software, hardware or operating system introduces expansive new features and corresponding new vulnerabilities. Companies – not always the ones introducing the vulnerabilities – attempt to combat these weaknesses. On the other side of the battle lines, teams of dedicated hackers try their hardest to exploit them.

The situation is an ever-changing stalemate, in that it seems philosophically unlikely that either side could win outright. If the hackers won then they would disappear overnight, since there'd be nothing left to gain, no system left unhacked and therefore no trusted platforms: back to pen and paper. As for a world without malware? Unimaginable.

Or is it? Some tech companies believe they have the answer, by wrapping running applications in an all-seeing manager or governor, which watches each application's every process and takes action if it sees something suspicious. This is a logical development of the trend for isolating applications to improve security. It can take on many different forms and has become more advanced over the past decade.

At its simplest, running an application within a virtual machine or simulation goes some way toward preventing any infection from reaching the host system. Malware might infect the VM, but once discovered it can simply be switched off and re-imaged as required. At least that's how the theory goes, though sophisticated malware can detect that it's running in a VM and attempt to exploit it, or get out through unsecured network connections.

To continue reading...


Please login or register to view your article. If you do not have or do not remember your password, please click on the “Forgotten your password?” link at the bottom.
If you do not yet have a password but are an existing user, please use the “Forgotten your password?

PREVIOUS ARTICLE

«Five reasons your network security policies aren’t working

NEXT ARTICLE

Enterprise GitHub projects of the week: Intelligence agency special»
Alex Cruickshank

Alex Cruickshank has been writing about technology and business since 1994. He has lived in various far-flung places around the world and is now based in Berlin.  

Add Your Comment

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?