Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles 2007
DOI: 10.1145/1294261.1294294
|View full text |Cite
|
Sign up to set email alerts
|

SecVisor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 404 publications
(15 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Running kernel monitoring: SecVisor and TrustVisor preserves the integrity of kernel code and data with a hypervisor that executes the monitored kernel as a guest OS as mentioned earlier [46], [47]. In an approach was proposed by Sharif et al [48] SIM achieves real-time inspection of kernel behavior that depend on the insertion of a monitoring mechanism into a guest OS's memory space.…”
Section: Outside Kernelmentioning
confidence: 99%
“…Running kernel monitoring: SecVisor and TrustVisor preserves the integrity of kernel code and data with a hypervisor that executes the monitored kernel as a guest OS as mentioned earlier [46], [47]. In an approach was proposed by Sharif et al [48] SIM achieves real-time inspection of kernel behavior that depend on the insertion of a monitoring mechanism into a guest OS's memory space.…”
Section: Outside Kernelmentioning
confidence: 99%
“…The TCB is only 250 lines of code and is meant to execute small sensitive pieces of code. SecVisor [Seshadri et al 2007] is a tiny hypervisor that ensures code integrity for OS kernels by checking that only previously approved code can execute in kernel mode. SecVisor exploits late launch technologies to boot the system safely.…”
Section: 34mentioning
confidence: 99%
“…SMEP [9] prohibits kernel-mode processes from executing codes in user space, which makes it infeasible to inject malicious code into user space. [10] proposes SecVisor, a tiny hypervisor that ensures code integrity, which ensures that only user-approved code can execute in kernel mode. It can protect the kernel against code injection attacks.…”
Section: Related Workmentioning
confidence: 99%