top left
2nd Workshop on Virtual Machine Security (VMSec)
top right
top nav  
bottom nav

In conjunction with the ACM Conference on Computer & Communications Security
November 9-13, 2009 Hyatt Regency Chicago, Chicago, IL, USA

This workshop, the first of its kind to deal exclusively with virtual machine security, will tackle the important research topics in virtualization security. Virtualization has seen an explosion in growth in deployment, implementations, and applications. Virtualization holds unique properties that make it attractive for security including isolation, compartmentalization, live state capture, and replay. Virtualization has been used to study malicious software as well as to prevent malicious software infection. In addition, virtualization itself is now the subject of attack. This workshop aims to bring together leading researchers in the fields of virtualization and security to present the latest work on these topics.

Important Dates

Paper submission deadline (revised): July 17th, 2009 [Paper Submission Site]
Paper acceptance or rejection: August 18, 2009
Final paper camera-ready copy: August 25, 2009

Scope and topics

- Applications of virtualization for security
- Security and integrity of virtual machines
- Detecting virtualization
- Evading virtualization
- Trapping malicious code via virtualization
- Economic implications of virtualization
- Attacks and vulnerabilities against virtualization environments
- Honey Nets and Honey Client architectures, systems, and results
- Management and control of virtual machine farms for security
- Forensics using virtualization
- Enhancing privacy and anonymity using virtualization
- Measuring security and performance of virtualization
- Instrumentation and control of virtualization
- Performance optimization of virtual machines
- Performance and security analysis of lightweight virtualization
- Virtualization for mobile devices
- Vulnerabilities in virtualization environments

Research submissions should be at most 12 pages excluding the bibliography and well-marked appendices using single-column, 11-point font and reasonable margins on letter-size paper, and at most 15 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Position papers should be at most 3 pages long in total using the same guidelines as above. Submissions need not be anonymized.

Paper Submission site

Organizing Committee

Program Chairs
Angelos Stavrou, George Mason University

Program Committee
Manuel Costa, Microsoft Research
Xuxian Jiang, North Carolina State University
Samuel King, University of Illinois at Urbana-Champaign
David Lie, University of Toronto
Peng Liu, Pennsylvania State University
Michael Locasto, George Mason University
Moheeb Rajab, Google Inc.
Arvind Seshadri, IBM Research
Micah Sherr, University of Pennsylvania
Stelios Sidiroglou-Douskos, MIT
Andrew Warfield, University of British Columbia
Xiaolan (Catherine) Zhang, IBM Research

bottom right
  bottom right
bottom left