Recent Changes - Search:

Instructor

  • who: Michael Swift
  • where: Room 7369
  • when: Monday 11-12, Thursday 1:30-2:30
  • email: swift 'at' cs.wisc.edu
  • TAs

Lecture:

HomePage

Resources

edit SideBar

Virtualization

  1. What is the difference in trusted computing base between a type 1 and type 2 hypervisor?
  2. What is the difference in attack surface between full and para-virtualization?
  3. Why would malware want to detect whether it is running on a virtual machine?
  4. Why would security researchers want to run malware on a virtual machine?
  5. What hardware resources have the best isolation between virtual machines? Which have the worst?
  6. What is different about virtual machines than physical machines that introduce new security issues?
Edit - History - Print - Recent Changes - Search
Page last modified on April 25, 2019, at 06:47 PM