Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments 2008
DOI: 10.1145/1346256.1346278
|View full text |Cite
|
Sign up to set email alerts
|

Improving Xen security through disaggregation

Abstract: Virtual machine monitors (VMMs) have been hailed as the basis for an increasing number of reliable or trusted computing systems. The Xen VMM is a relatively small piece of software -a hypervisor -that runs at a lower level than a conventional operating system in order to provide isolation between virtual machines: its size is offered as an argument for its trustworthiness. However, the management of a Xen-based system requires a privileged, fullblown operating system to be included in the trusted computing bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
86
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 164 publications
(86 citation statements)
references
References 22 publications
0
86
0
Order By: Relevance
“…This increasing attack trend has spurred research towards reducing the hypervisor Trusted Code Base (TCB) of current commercial hypervisors [26]. Others developed new specialized prototype hypervisors [36,24].…”
Section: Introductionmentioning
confidence: 99%
“…This increasing attack trend has spurred research towards reducing the hypervisor Trusted Code Base (TCB) of current commercial hypervisors [26]. Others developed new specialized prototype hypervisors [36,24].…”
Section: Introductionmentioning
confidence: 99%
“…In this case, R&R could be leveraged to resume the malware's execution from the point of detection, with the VMM code now adapted to avoid detection and resume the malware analysis. Similar to other VMM-based security research efforts [16,17,18,20,21], we assume a trustworthy VMM and this is supported with recent progress in improving the hypervisor security [25,27,38].…”
Section: Discussionmentioning
confidence: 99%
“…In the meantime, our system assumes a trustworthy hypervisor as the necessary trusted computing base (TCB) to provide strict VM isolation. This assumption is shared by many other hypervisor-based security research efforts [13,14,17,25,43] and being hardened by existing hypervisorprotection solutions [26,41]. We will discuss possible attacks (e.g., VM escape) in Section 6.…”
Section: Designmentioning
confidence: 99%