Abstract: This paper presents a new concept of security assessment methodology for the hiding of virtualization from the attacks and several areas of its application. Virtual machine environments (VMEs) let a user or administrator sprint one or more guest operating systems on top of a host operating system—for example, three or four instances of the Microsoft Windows operating system could run as caller systems on a Linux host operating system on a single PC or server. Such environments are widely used as patrons or servers in a diversity of commercial, administration, and martial organizations. Beyond normal business operations, security researchers and honey pot technologies often leverage VMEs to analyse malicious code discovered in the feral to determine its functionality, business model, origin, and author. Because VMEs offer useful monitoring and isolation capabilities, malware researchers are increasingly reliant on these products to conduct their trade.
Keywords: Include at least 4 keywords or phrases.