期刊文献+

利用可信赖执行技术防范基于hypervisor的rootkit 被引量:1

Preventing Hypervisor-based Rootkit with Trusted Execution Technology
原文传递
导出
摘要 虚拟化技术的发展和应用,给虚拟机的安全带来了新的威胁和挑战。论文深入研究和分析了针对虚拟机的rootkit攻击以及虚拟机监控软件(hypervisor)面临的安全风险,提出了检测和防范rookit攻击的方法。结合可信赖执行技术(TXT)的特点,给出了防范基于hypervisor的rootkit的方法和步骤,并探讨了虚拟机安全的发展趋势和下一步的研究方向。 Development and applications of virtualization technology have brought new threats and challenges to virtual machine security. In this paper, the rootkit attacks on virtual machine and the security risks faced by hypervisor are studied and analyzed in detail. And the methods for detecting and analyzing rookit attacks are proposed. In combination with Trusted Execution Technology(TXT) characteristics, the methods and procedures in preventing hypervisor-based rootkit are given. Finally, the development trends of virtual machine security and its further research directions are discussed.
出处 《信息安全与通信保密》 2009年第7期76-78,81,共4页 Information Security and Communications Privacy
关键词 ROOTKIT 可信计算 虚拟机监控软件 策略 rootkit trusted computing hypervisor policy
  • 相关文献

参考文献6

  • 1Peter Ferrie. Attacks on virtual machine emulators [R]. Tech. rep.Symantec Security Response, 2006.
  • 2怀进鹏,李沁,胡春明.基于虚拟机的虚拟计算环境研究与设计[J].软件学报,2007,18(8):2016-2026. 被引量:78
  • 3Tal Garfinkek, Ben Pfaff, Jim Chow. Mendel Rosenblum and Dan Boneh.Terra: a virtual machine-based platform for trusted computing[C]. SOSP03: Proceedings of 19th ACM Symposium on Operating Systems Principles. New York, NY, US, ACM, 2003, 193-206.
  • 4Rafal Wojtcauk. Subverting the Xen hypervisor[EB/OL]. [2008]. http: //invisiblethingslab.com/bh08/ papers/part 1 -subverting_xen.pdf.
  • 5Intel. Intel trusted execution technology measured launched environment developer' s guide[EB/OL]. [2008]. http: //download.intel.com/technology/security/downloads/ 315168.pdf.
  • 6Yuriy Bulygin and David Samyde. Chipset based approach to detect virtualization malware a.k.a. DeepWatch[EB/OL]. Black Hat USA. [2008]. http: / /www.mnm-team.org/pub/Fopras/frit08/PDF-Version/frit08.pdf.

二级参考文献2

共引文献77

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部