Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture

نویسندگان

  • Amit Vasudevan
  • Jonathan M. McCune
  • Ning Qu
  • Leendert van Doorn
  • Adrian Perrig
چکیده

Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardware that includes virtualization support, observing that without the fundamental property of hypervisor integrity, no secrecy properties can be achieved. Unfortunately, we find that significant issues remain for constructing an integrity-protected hypervisor on such hardware. Based on our analysis, we describe a set of necessary rules that must be followed by hypervisor developers and users to maintain hypervisor integrity. No current hypervisor we are aware of adheres to all the rules. No current x86 hardware platform we are aware of even allows for the construction of an integrity-protected hypervisor. We provide a perspective on secure virtualization and outline a research agenda for achieving truly secure hypervisors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing Embedded Virtualized Intel(R) Architecture Platforms with the right Embedded Hypervisor

Virtualization is fast becoming a key enabling technology for embedded designs, offering the potential opportunity to consolidate multi-processor designs into a single processor multi-core design, legacy and proprietary embedded software migration and separation for performance and safety critical applications. In this paper, we investigate the various hypervisor software models that exist and ...

متن کامل

Efficient TCB Reduction and Attestation (CMU-CyLab-09-003)

We develop a special-purpose hypervisor called TrustVisor that facilitates the execution of security-sensitive code in isolation from commodity OSes and applications. TrustVisor provides code and execution integrity as well as data secrecy and integrity for protected code, even in the presence of a compromised OS. These strong properties can be attested to a remote verifier. TrustVisor only add...

متن کامل

Performance Profiling in a Virtualized Environment

Virtualization is a key enabling technology for cloud computing. Many applications deployed in a cloud run in virtual machines. However, profilers based on CPU performance counters do not work well in a virtualized environment. In this paper, we explore the possibilities for achieving performance profiling in virtual machine monitors (VMMs) built on paravirtualization, hardware assistance, and ...

متن کامل

Efficient TCB Reduction and Attestation

We develop a special-purpose hypervisor called TrustVisor that facilitates the execution of security-sensitive code in isolation from commodity OSes and applications. TrustVisor provides code and execution integrity as well as data secrecy and integrity for protected code, even in the presence of a compromised OS. These strong properties can be attested to a remote verifier. TrustVisor only add...

متن کامل

Regarding the challenges of Performance Analysis of Virtualized Systems

Virtualization is an irreplaceable technique for efficient management of hardware resources in the field of information technology and computer science. With this phenomenal technology come challenges that hinder proper performance analysis of virtualized systems. This study focuses on virtualization implementations, various enterprise solutions, characterization of observations, concerns, pitf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010