期刊文献+

基于本地虚拟化技术的安全虚拟执行环境 被引量:7

A Safe Virtual Execution Environment Based on the Local Virtualization Technology
下载PDF
导出
摘要 程序隔离执行是一种将非可信代码的执行效果与其他应用隔离的安全机制。但是,目前的相关研究无法兼顾强隔离(即操作系统隔离)与被隔离代码的可用性(需要通过计算环境的重现与提交隔离执行环境的执行效果来完成)。本文提出一种基于本地虚拟化技术的安全虚拟执行环境SVEE,并在Windows下实现了SVEE的原型系统。SVEE借助系统级虚拟化技术有效地实现了SVEE内程序与宿主操作系统的强隔离。SVEE的关键特性是利用本地虚拟化技术实现了宿主机计算环境在SVEE内的重现,使得程序在SVEE中与在宿主操作系统内的执行效果一致。此外,SVEE还支持SVEE与宿主操作系统的差异对比,并利用比较结果选择合适的方法将SVEE内程序的执行效果提交到宿主操作系统。 Isolation is a mechanism that has been applied to allow untrusted code to run while isolating their effects Irom the rest of the system. But the current isolation technologies cannot achieve both the strong isolation (i. e. , operating system isolation) and the functionality of isolated applications (accomplished via reproducing the computing environment and committing changes within the isolated environment). In this paper, we propose a safe virtual execution environment (SVEE) based on the local virtualization technology and implement it on Windows. Via systematic virtualization,SVEE fulfills strong isolation, thus completely isolates the effects of untrusted code execution within SVEE from the underlying host operating system. The key feature of SVEE is that it provides the capability to reproduce the computing environment of the host operating system, therefore it can reproduce the behavior of applications, as if it were running natively within the host operating system. This is accomplished via the local virtualization technology. Moreover, SVEE provides a convenient way to compare the changes within SVEE and the host operating system. Using these comparison results for reference, SVEE will select a proper method to commit these changes.
出处 《计算机工程与科学》 CSCD 2008年第4期1-4,10,共5页 Computer Engineering & Science
基金 国家973计划资助项目(2005CB321801)
关键词 入侵隔离 隔离执行 虚拟执行环境 安全 虚拟机 intrusion isolation isolated execution virtual execution environment security virtual machine
  • 相关文献

参考文献8

  • 1Cohen F. Computational Aspects of Computer Viruses[J].Computers & Security, 1989,8(4):325-344.
  • 2Chess D M, White S R. An Undeteetable Computer Virus [EB/OL]. [2007-02-12]. http://www.research.ibm. com/ antivirus/Scipapers/VB 2000DC. htm.
  • 3Chen P M, Noble B D. When Virtual is Better Than Real[C] //Proe of the 8th Workshop on Hot Topics in Operating Systems, 2001.
  • 4Whitaker A,Shaw M,Gribble S D. Denali: A Scalable Isolation Kernel[C]//Proc of the 10th ACM SIGOPS European Workshop, 2002.
  • 5Whitaker A, Shaw M, Gribble S D. Denali: Lightweight Virtual Machines for Distributed and Networked Applications [C]//Proc of the USENIX Annual Technical Conf, 2002.
  • 6Liang Z, Venkatakrishnan V N, Sekar R. Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs[C]//Proc of Annual Computer Security Applications Conf,2003.
  • 7Sun Weiqing, Liang Zhenkai, Venkatakrishnan V N, et al. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments[C]//Proc of the 12th Annual Symp on Network and Distributed System Sacurity,2005.
  • 8Bellard F. QEMU: A Fast and Portable Dynamic Translator [C]//Proc of the USENIX Annual Technical Conf, 2005.

同被引文献45

  • 1董亮卫,黄鹂声,张文婧,王驎峰.Windows NT文件系统过滤驱动程序在信息安全中的应用[J].信息技术,2005,29(10):135-138. 被引量:11
  • 2方艳湘,黄涛.Linux可信启动的设计与实现[J].计算机工程,2006,32(9):51-53. 被引量:13
  • 3Goldberg R P. Architectural Principles for Virtual Computer Systems [ D]. Cambridge:Harvard University, 1972 : 1-5.
  • 4Adams K, Agesen O. A comparison of software and hardware techniques for X86 virtualization[ C]// Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems. New York.. ACM, 2006:2-13.
  • 5Huang Y, Stavrou A, Ghosh A K, et al. Efficiently tracking application interactions using lightweight virtualization[C]// Proceedings of the 1st ACM Workshop on Virtual Machine Security. New York.. ACM, 2008 : 19-28.
  • 6Isolated Execution. [2008-11-21]. http://isolate& exec. sourceforge, net.
  • 7Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003:164-177.
  • 8Pratt. Xen 3. 0 and the art of virtualization[C]// Proceedings of the Ottawa Linux Symposium. Ottawa: 2005 Linux Symposium, 2005:65-78.
  • 9Garfinkel T, Pfaff B, Chow J, et al. A virtual machine-based platform for trusted eomputing [C]// Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003 : 193-206.
  • 10OpenTC. [2005-11-15]. http://www, opente, net.

引证文献7

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部