Hypervisors and Security

Introduction: Connected devices that are part of the Internet of things are at risk of being remotely attacked. Performing such attacks require the exploitation of vulnerabilities in their Trusted Computer Base, the parts of the software and hardware that are critical to the devices’ security. Designing remote attacks can be attractive for organized crime groups as they can extort money from device manufacturers by threatening to cause damages. Using secure operating systems is necessary to prevent such attacks, along with secure hypervisors when necessary.

Print Print