2010
DOI: 10.1007/978-3-642-13869-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…These works tackled the problem of periodically scheduling the SMM to perform integrity verification using a variety of external hardware events. Vasudevan et al [21] further explored the requirements to establish hypervisor integrity verification and protection on the x86 hardware.…”
Section: Related Workmentioning
confidence: 99%
“…These works tackled the problem of periodically scheduling the SMM to perform integrity verification using a variety of external hardware events. Vasudevan et al [21] further explored the requirements to establish hypervisor integrity verification and protection on the x86 hardware.…”
Section: Related Workmentioning
confidence: 99%
“…Because our method involves virtualization technology, we also make the assumption that the virtual machine monitor (VMM) is always trusted. This is usually a fundamental assumption for hypervisor‐based security researches and is consolidated (although not guaranteed) by existing hypervisor protection mechanisms . In our threat model, we assume the VMM is secure and the attacks to the VMM are out of the scope of this paper.…”
Section: Attack Scenario and Threat Modelmentioning
confidence: 99%
“…The fourth and last attack considers a hypothetical cloud with a security level much higher than what we considered so far. This cloud uses integrity-protected hypervisors, i.e., hypervisors that have a certain configuration and are protected against modification [23], [20]. This protection is obtained by using a trusted boot process that involves the Trusted Platform Module (TPM) to assure the user that a certain hypervisor and software configuration was started.…”
Section: Virtual Machine Relocationmentioning
confidence: 99%