Delusional Boot: Securing Cloud Hypervisors without Massive Re-engineering

نویسندگان

  • Anh Nguyen
  • Himanshu Raj
  • Shravan Rayanchu
  • Stefan Saroiu
  • Alec Wolman
چکیده

The set of virtual devices offered by a hypervisor to its guest VMs is a virtualization component ripe with security exploits – more than half of all vulnerabilities of today’s hypervisors are found in this codebase. This paper presents Min-V, a hypervisor that disables all virtual devices not critical to running VMs in the cloud. Of the remaining devices, Min-V takes a step further and eliminates all remaining functionality not needed for the cloud. To implement Min-V, we had to overcome an obstacle: the boot process of many commodity OSes depends on legacy virtual devices absent from our hypervisor. Min-V introduces delusional boot, a mechanism that allows guest VMs running commodity OSes to boot successfully without developers having to re-engineer the initialization code of these commodity OSes, as well as the BIOS and pre-OS (e.g., bootloader) code. We evaluate Min-V and demonstrate that our security improvements incur no performance overhead except for a small delay during reboot of a guest VM. Our reliability tests show that Min-V is able to run unmodified Linux and Windows OSes on top of this minimal virtualization in-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of Hypervisors in the Private Cloud based on System Information using SIGAR Framework and for System Workloads using Passmark

Hypervisors using virtualization technology enable multiple operating systems to run on one physical server. Cloud computing model is less expensive because it streamlines the delivery of services by providing a stage for optimizing complex IT resources in a scalable manner with the help of virtualization technology and hypervisors. Selecting a suitable hypervisor for their organization’s priva...

متن کامل

Evaluation of Different Hypervisors Performance in the Private Cloud with SIGAR Framework

To make cloud computing model Practical and to have essential characters like rapid elasticity, resource pooling, on demand access and measured service, two prominent technologies are required. One is internet and second important one is virtualization technology. Virtualization Technology plays major role in the success of cloud computing. A virtualization layer which provides an infrastructur...

متن کامل

Building Secretkey Based Virtual Machines in Cloud Computing to avoid Vulnarabilities in Hypervisors

Cloud computing becomes more and more adaptive technology for the current computing world. In the cloud environment to provide infrastructure resources to the end customer they are using virtualization technology. Virtualization is built on a software module called hypervisors. By implementing virtualization in the cloud the same resources are shared among different end customers. This may lead...

متن کامل

Evaluation of different Hypervisors Performances using Different Benchmarks

Virtualization has become a popular way to make more efficient use of server resources within both private data centers and public cloud platforms. Hypervisors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. While recent advances in CPU architectures and new virtualization techniques have reduced ...

متن کامل

Securing Healthcare Records Using Proxy Re-Encryption Scheme in Cloud

The advent of semi-conductors emerged day to day and lead us to the current trend of Cloud computing, which brings the information required to our life at our finger tips. The technology of today is getting expanded every day, especially in the management of EHR’s. In order to provide high security for health care data we need a strong security mechanism for EHR, Proxy re-encryption schemes are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012