2009 Cybersecurity Applications &Amp; Technology Conference for Homeland Security 2009
DOI: 10.1109/catch.2009.45
|View full text |Cite
|
Sign up to set email alerts
|

Information-Flow Aware Virtual Machines: Foundations for Trustworthy Computing

Abstract: Many software systems in use today have enormous trusted computing bases (TCBs). We propose an architecture that makes it possible to shrink the TCB of many such systems. Our solution is based on a virtual-machine (VM) with added information-flow capabilities. In our architecture, all application programs run outside of the TCB under the control of the VM and cannot cause information leaks even if they try. We have implemented a prototype of this architecture and found that the resulting run-time overhead is m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 23 publications
(19 reference statements)
0
0
0
Order By: Relevance