How the various security vendors plan to address hypervisor access is still an open question.
FORBES: Repackage or Reimagine? Virtualization and the Potential for a New Security Regime
To reach the hypervisor, he had to get past two chips called the Cell and the Cell Memory.
Hotz spent long nights writing drafts of the program on his PC, and trying them out on the hypervisor.
Sony responded by releasing a software update that disabled OtherOS, the feature through which Hotz had accessed the hypervisor.
The hypervisor is 99 percent written in pure Java, so any Java app is a candidate for running on this.
FORBES: Lousy London Economy Good For A Data Center Density Enhancer
The hypervisor vendors would like to bake it all into their platforms.
FORBES: Your Music is Moving to the Cloud. What About the Rest of Your Business?
It distributes its hypervisor as free, open-source software but sells related products.
The server virtualization leader announced version 5 of its venerable hypervisor and version 1.5 of vCloud Director, its IaaS platform atop vSphere.
Bromium is shoring up enterprise security via new hypervisor software that creatively expands the concept of Byzantine fault tolerance software design principles.
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
VMware is best known for its hypervisor, it now makes more money from a suite of other products, such as software to manage virtual machines.
This level of enforcement requires special access to the hypervisor.
FORBES: Repackage or Reimagine? Virtualization and the Potential for a New Security Regime
Also inside the CPU is a hypervisor that verifies the running state of the kernel, making sure there is no modification (RAM checksums), else the Xbox 360 panics and blows up!
Jackson also emphasized the need for open standards when dealing with virtualization and cloud computing, an extremely welcome step, but we can start with VMware View, allowing it to be hypervisor independent.
FORBES: VMworld 2010: Day 1, Attendees Say ��Yes, We Cloud!��
Since Bromium is in stealth mode, we are anxious to hear more details about how the new hypervisor will work and its potential to dramatically reduce or eliminate threats to cloud security.
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
VMware has already reacted cleverly by slashing the price for its hypervisor and persuading hardware firms to embed it in their machines, putting it on a more equal footing with Microsoft when it comes to distribution.
The company makes this possible by creating a security-focused hypervisor that automatically, instantly and invisibly hardware-isolates each vulnerable Windows task in a micro-VM that cannot modify Windows or gain access to enterprise data or network infrastructure.
But the attack Rutkowska outlined goes even further: she described how an intruder could install what she calls a "blue pill, " a second, malicious hypervisor that controls the original hypervisor and all of the virtual machines beneath it.
Examining any PC or server hosted on the machine, it would appear that the machines were hosted normally by a hypervisor, but, she argues, it would be tough to detect another hidden hypervisor intercepting data or manipulating the virtualized computers.
应用推荐