An approach to on the ﬂy activation and deactivation of virtualization-based security systems.
We report on work in progress which allows on the fly activation and deactivation of hardware virtualization based security systems intended for protecting applications running under the control of untrusted operating system. We present an approach for reserving hardware resources from the operating system for the hypervisor and additional virtual machines that may be required by the security system. We also consider that hypervisor is launched from the untrusted environment that may try to fool the user during the startup and shutdown of the hypervisor.Full text of the paper in pdf
Proceedings of Spring/Summer Young Researchers' Colloquium on Software Engineering, Nizhniy Novgorod, 2010, pp. 157-161.