The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990
DOI: 10.1109/risp.1990.63834
|View full text |Cite
|
Sign up to set email alerts
|

A VMM security kernel for the VAX architecture

Abstract: This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware, microcode, and software are aimed at meeting Aleffort has bccn primarily aimcd at identifying the differences and their cost in development effort and in kernel complexity.This paper dcscribes how the VAX security kcrncl meets its five InajOr goals:* Mcet all AI security rcquircments.levcl security requirements while maintaining the stand… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2002
2002
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 11 publications
0
25
0
Order By: Relevance
“…Today, discussions of layered design tend to introduce additional complexity by allowing a richer tree of objects. SVS was an almost pure sequence of single layers (see Figure 1, from [1]). The absolute simplicity of the layering of the system is what gave the layered design some of its power as a structure for both call flow and overall system organization.…”
Section: Layered Designmentioning
confidence: 99%
See 2 more Smart Citations
“…Today, discussions of layered design tend to introduce additional complexity by allowing a richer tree of objects. SVS was an almost pure sequence of single layers (see Figure 1, from [1]). The absolute simplicity of the layering of the system is what gave the layered design some of its power as a structure for both call flow and overall system organization.…”
Section: Layered Designmentioning
confidence: 99%
“…In May of 1990, "A VMM Security Kernel for the VAX Architecture" [1] was lead paper at the IEEE Symposium on Security and Privacy, and was awarded Best Paper. "The Auditing Facility for a VMM Security Kernel" [2] was also presented that year, and the year after, two papers on covert channels, "An Analysis of Covert Timing Channels" [3] and "Storage Channels in Disk Arm Optimization" [4] were presented.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Various virtual machine monitor approaches have been suggested [14,42,7] for supporting COTS applications while reliably separating different domains of data. In general, for these approaches to be trustworthy requires both the use of strictly virtualizable hardware [29], and a trustworthy monitor mechanism for separating the activities of the virtual machines.…”
Section: Related Workmentioning
confidence: 99%
“…Creating a monitor sufficiently trusted to both separate different domains of activity, and allow read-down to less sensitive domains (as does MYSEA) is all the more difficult. While at least one was designed to provide high assurance read-down capabilities [42], it was never fielded. The VMM approach remains problematic for separation of different domains of data because of the difficulty of creating a trusted VMM.…”
Section: Related Workmentioning
confidence: 99%