----------------------------Original message----------------------------
To: [EMAIL PROTECTED]
From: "Sean W. Smith" <[EMAIL PROTECTED]>
X-ASG-Orig-Subj: [ias-opportunities] CFP: security and virtualization special
 issue
Subject: [ias-opportunities] CFP: security and virtualization special issue
Date: Thu, 17 Jan 2008 16:41:52 -0500
Reply-To: "Sean W. Smith" <[EMAIL PROTECTED]>
Content-Transfer-Encoding: quoted-printable

IEEE Security & Privacy
Special issue on virtualization
September/October 2008
Deadline for submissions: 6 February 2008
Visit www.computer.org/portal/pages/security/author.xml to submit a
manuscript
Guest editors: Samuel T. King (UIUC), Sean W. Smith (Dartmouth)
Virtualization has several properties that make it useful for
security applications. Traditional virtual machine monitors aspire to
enforce strong isolation among multiple operating systems (OSes)
running on the same physical hardware, enable software services to be
implemented below the OS at a layer usually only accessible by
hardware, and provide low-level software with convenient abstractions
of the virtual machineĆ­s hardware resources. Other approaches aspire
to provide multiple virtual but isolated images of the same OS
installation. These properties helped foster a new class of virtual-
machine- based security services and made virtualization a staple of
many enterprise computing environments.
A common topic in the early days of computing, virtualization has
recently seen a resurgence of commercial and research interest.
Consequently, the security implications of virtualization technology
are the topic of the Sept./Oct. 2008 special issue of IEEE Security &
Privacy magazine. We are looking for feature articles with an in-
depth coverage of topics related to virtualization technology and how
it applies to security. Among the potential topics are:
--Virtualization for intrusion detection
--Virtualization for forensic analysis of compromised computer systems
--Virtualization for analyzing malicious software
--Hardware support for secure virtualization
--Security interfaces between VMMs and operating systems
--Securing applications using virtualization
--Securing attacks using virtualization
--Security analysis of virtualization
The above list is neither complete nor closed. Authors are encouraged
to submit articles that explore other aspects of virtualization and
its application to security. Submissions will be subject to the peer-
review methodology for refereed papers. Articles should be
understandable to a broad audience of people interested in security
and privacy. The writing should be down to earth, practical, and
original. Authors should not assume that the audience will have
specialized experience in a particular subfield. All accepted
articles will be edited according to the IEEE Computer Society style
guide.

Reply via email to