Instructor
- who: Michael Swift
- where: Room 7369
- when: Monday 11-12, Thursday 1:30-2:30
- email: swift 'at' cs.wisc.edu
- TAs
Lecture:
HomePage
Resources
edit SideBar
|
- What is the difference in trusted computing base between a type 1 and type 2 hypervisor?
- What is the difference in attack surface between full and para-virtualization?
- Why would malware want to detect whether it is running on a virtual machine?
- Why would security researchers want to run malware on a virtual machine?
- What hardware resources have the best isolation between virtual machines? Which have the worst?
- What is different about virtual machines than physical machines that introduce new security issues?
|