![Virtual Machine Introspection with Xen on ARM](https://writelatex.s3.amazonaws.com/published_ver/1283.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240727T115137Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240727/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=e28b08950cc1c054af129ac8db73b18cf81293176806b6efd301d35d7671d496)
Virtual Machine Introspection with Xen on ARM
Author
Tamas Lengyel
Last Updated
10年前
License
Creative Commons CC BY 4.0
Abstract
In the recent years, virtual machine introspection (VMI) has become a valuable technique for developing security applications for virtualized environments. With the increasing popularity of the ARM architecture, and the recent addition of hardware virtualization extensions, there is a growing need for porting existing VMI tools. Porting these applications requires proper hypervisor support, which we have been implementing for the upcoming release of the Xen hypervisor.
![Virtual Machine Introspection with Xen on ARM](https://writelatex.s3.amazonaws.com/published_ver/1283.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240727T115137Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240727/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=e28b08950cc1c054af129ac8db73b18cf81293176806b6efd301d35d7671d496)