Virtually Secure - Detection and Escape from Virtual Machines

FIRST TC Plennary sessions

Wednesday — October 17th, 2007 12:00

Virtualization tools like VMware, Microsoft Virtual Server, and the Linux KVM represent some of the fastest growing segments in IT.

Many of these technologies are deployed in ways that assume that they provide a high degree of isolation between host and guest. Over the past two years, Intelguardians has been researching the degree of isolation that various virtual machine environments (VMEs) provide and poking at the boundaries between host and guest. This session will present our findings and provide concrete guidelines for deploying virtualization as securely as possible.

Presenters

  • Tom Liston (SANS Internet Storm Center, US) US

    Tom ListonTom Liston is a Senior Security Consultant for Intelguardians and an Incident Handler for the SANS Institute's Internet Storm Center. Mr. Liston is the co-author (with Ed Skoudis) of the book Counter Hack Reloaded : A Step-by-Step Guide to Computer Attacks and Effective Defenses. He is also a founding member of the ISC's Malware Research Team and is the author of a popular series of articles at the ISC titled "Follow the Bouncing Malware".