2013
DOI: 10.1007/978-3-642-38908-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Guardian: Hypervisor as Security Foothold for Personal Computers

Abstract: Abstract. Personal computers lack of a security foothold to allow the end-users to protect their systems or to mitigate the damage. Existing candidates either rely on a large Trusted Computing Base (TCB) or are too costly to widely deploy for commodity use. To fill this gap, we propose a hypervisor-based security foothold, named as Guardian, for commodity personal computers. We innovate a bootup and shutdown mechanism to achieve both integrity and availability of Guardian. We also propose two security utilitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Without AppShield protection, the performance overhead is due to the virtualization itself. The full evaluation has been reported in [7]. Generally, it only introduces 0.2% to 10.3% performance overhead.…”
Section: Appshield Impacts On Performancementioning
confidence: 99%
See 1 more Smart Citation
“…Without AppShield protection, the performance overhead is due to the virtualization itself. The full evaluation has been reported in [7]. Generally, it only introduces 0.2% to 10.3% performance overhead.…”
Section: Appshield Impacts On Performancementioning
confidence: 99%
“…The prototype consists of a dedicated hypervisor [7] running on the bare-metal hardware, and a Linux loadable module as the transit module. The code base of the hypervisor is around 29K SLOC with 218KB binary size.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
“…The hypervisor is trusted and secure as the root of trust. Although there are vulnerabilities for some existing hypervisors, we can leverage additional security services to enhance their integrity [34,6,4] and reduce their attack surfaces [32,7]. As our system relies on a training-based approach, we also assume the system is clean and trusted in the training stage, but it could be compromised at any time after that.…”
Section: Threat Modelmentioning
confidence: 99%
“…Here author discussed HSEM component for monitoring each VM behavior whereas HAREM checks reliability for a host. In [17], the authors have discussed hypervisor-based security wherein they explored the mechanism for secure booting with several approaches for secure I/O calls occurred across the hypervisor and guest OS.…”
Section: Related Workmentioning
confidence: 99%