top left
1st Workshop on Virtual Machine Security (VMSec)
October 31, 2008 - George Mason University
top right
top nav  
bottom nav

In conjunction with the ACM Conference on Computer & Communications Security
Location: GMU Johnson Center Room G (Campus Map)

This workshop, the first of its kind to deal exclusively with virtual machine security, will tackle the important research topics in virtualization security. Virtualization has seen an explosion in growth in deployment, implementations, and applications. Virtualization holds unique properties that make it attractive for security including isolation, compartmentalization, live state capture, and replay. Virtualization has been used to study malicious software as well as to prevent malicious software infection. In addition, virtualization itself is now the subject of attack. This workshop aims to bring together leading researchers in the fields of virtualization and security to present the latest work on these topics.

Important Dates

Paper submission deadline: June 2, 2008 June 9th, 2008 (Extended)
Paper acceptance or rejection: July 10, 2008 July 27th, 2008
Final paper camera-ready copy: August 5, 2008 August 10th, 2008

Scope and topics

Applications of virtualization for security
Security and integrity of virtual machines
Detecting virtualization
Evading virtualization
Trapping malicious code via virtualization
Economic implications of virtualization
Attacks and vulnerabilities against virtualization environments
Honey Nets and Honey Client architectures, systems, and results
Management and control of virtual machine farms for security
Forensics using virtualization
Enhancing privacy and anonymity using virtualization
Measuring security and performance of virtualization
Instrumentation and control of virtualization
Performance optimization of virtual machines
Performance and security analysis of lightweight virtualization
Virtualization for mobile devices
Vulnerabilities in virtualization environments

Paper Submission

Research submissions should be at most 12 pages excluding the bibliography and well-marked appendices using single-column, 11-point font and reasonable margins on letter-size paper, and at most 15 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Position papers should be at most 3 pages long in total using the same guidelines as above. Submissions need not be anonymized.

Paper Submission site

Organizing Committee

Program Chairs
Jason Nieh, Columbia University
Angelos Stavrou, George Mason University

Program Committee
Manuel Costa, Microsoft Research
Leendert van Doorn, AMD
Tal Garfinkel, Stanford University and VMware
Anup Ghosh, George Mason University
Trent Jaeger, Pennsylvania State University
Xuxian Jiang, George Mason University
Sam King, University of Illinois
Ophir Rachman, VMware
Andrew Warfield, University of British Columbia

bottom right
  bottom right
bottom left