A Systematic Review of Vulnerabilities in Hypervisors and Their Detection

aut.relation.conferenceTwenty-third Americas Conference on Information Systemsen_NZ
aut.relation.pages10
aut.researcherLitchfield, Alan
dc.contributor.authorLitchfield, Aen_NZ
dc.contributor.authorShahzad, Aen_NZ
dc.contributor.editorStrong, Den_NZ
dc.contributor.editorGogan, Jen_NZ
dc.date.accessioned2019-09-05T03:21:06Z
dc.date.available2019-09-05T03:21:06Z
dc.date.copyright2017en_NZ
dc.date.issued2017en_NZ
dc.description.abstractThe paper presents a systematic review of risk assessment processes to provide an overview of the risks to cloud computing and identify future research directions. This paper also provides an analysis of sophisticated threats to hypervisors and highlights vulnerabilities and exploits. Virtualization is a core feature of Cloud Computing and it is often a target for attackers. The hypervisor, which provides thevirtualization layer, if compromised, can result in loss or damage to critical assets owned by Cloud Service Providers and their customers. The exploitation of hypervisor vulnerabilities provide opportunities for an attacker to launch sophisticated attacks such as Cross-VM Side Channel, Denial of Service, and Hypervisor Escape. The rate of adoption of cloud services is reflected in the lack of security controls against such sophisticated attacks and the resulting lack of trust, therefore we argue that risk assessment for hypervisors’ is significant for Cloud Service Providers.
dc.identifier.citationPublished in 23rd Americas Conference on Information Systems (AMCIS) 2017 Proceedings, Information Systems Security and Privacy (SIGSEC), Retrieved from: https://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/3/
dc.identifier.urihttps://hdl.handle.net/10292/12793
dc.publisherAssociation for Information Systems (AIS)
dc.relation.urihttps://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/3/
dc.rightsAIS has a green Open Access Policy. Authors may immediately self-archive their articles without an embargo period when publishing.
dc.rights.accessrightsOpenAccessen_NZ
dc.subjectHypervisor; Vulnerabilities; Risk assessment; Vulnerability exploits; Vulnerability assessment; Zero-day threat
dc.titleA Systematic Review of Vulnerabilities in Hypervisors and Their Detectionen_NZ
dc.typeConference Contribution
pubs.elements-id281478
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Design & Creative Technologies
pubs.organisational-data/AUT/Design & Creative Technologies/Engineering, Computer & Mathematical Sciences
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A Systematic Review of Vulnerabilities in Hypervisors and Their D.pdf
Size:
225.48 KB
Format:
Adobe Portable Document Format
Description:
Conference Contribution
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AUT Grant of Licence for Scholarly Commons Feb2017.pdf
Size:
239.25 KB
Format:
Adobe Portable Document Format
Description: