
I don't know how prevalent it is these days, though.Ī virtual machine is exactly that, a logically separate machine, so it must have the same security layers placed on it as you would a bare-metal system. Some malware has show the ability to detect that they're being executed inside a VM and thus change their behavior, much to the aggravation of malware researchers attempting to use VMs as a way to test malware.
#Best virtual machine software for security and privacy install#
This is a special software pathway for infection don't install the tools, don't have the vulnerability. This is the software you install to make the guest OS run more efficiently (for VMWare this is what allows on the fly cursor capture, and sharing between guest and host without a network). The few vulnerabilities I see these days are based more in the 'vmtools' portion. Since I first saw those papers, Intel has made some significant processor instruction-set improvements in allowing separation of VM and hypervisor.

These are usually seen, rightly so, as security vulnerabilities by the VM vendors and treated as such. There have been some white-papers published over the years describing ways that researchers have managed to infest a host OS from a VM. It is also not very practical for common systems, as to have four VMs, you'd need four harddrives hanging off four disk controllers, four video cards, four USB controllers with four mice, etc.Ģ020 update: all the recent hardware based vulnerabilities (Meltdown,Spectre,Foreshadow,ZombieLoad,CacheOut,SPOILER,etc) family of vulnerabilities are great examples of how VM's are always going to be able to communicate, simply because they share hardware (caches, TLB, branch prediction, TSX, SGX) that were never intended or prepared to be partitioned and isolated. x86 isn't the greatest platform for it, as there are many instructions that cannot be virtualized, to fully support the 'no sharing' idea. This has deep consequences, as it requires the underlying computer architecture to be designed in a way in which this can be carried out in a non-bypassable manner.ģ0yrs after this paper, we finally have few products that claim to do it. It's a result of John Rushby's 1981 paper which basically states that in order to have VMs isolated in a manner that could be equivalent to physical separation, the computer must export its resources to specific VMs in a way where at no point any resource that can store state is shared between VMs. The most interesting approach to securing VMs is called the Separation Kernel. Storage covert channel would be a bit harder as the virtual disks tend to have a hard limit on them, so unless you have a system that can over-commit disk space, it should not be an issue. If you are sharing CPUs, a busy process on one VM can effectively communicate state to another VM (that's your prototypical timing covert channel). Regular viruses tend to only operate in usermode, so while they couldn't communicate overtly, they could still set up a covert channel.

worms) will propagate to wherever their addressing/routing allows them to. Usually you have them networked, so any malware with a network component (i.e.
