期刊文献+

基于虚拟机技术的非可信软件对抗方法研究

Research on Methods to Combat Non-Credible Software Based on Virtual Machine Technology
原文传递
导出
摘要 当前对程序隔离技术的研究难以同时兼顾程序功能的完整性以及计算环境的重现。针对这个问题,文中对当前的隔离技术进行改进,并提出了一种新的名为SVMM(Safe Virtual Machine Model)的程序隔离技术模型,该模型能更好的支持程序功能完整性,计算环境的重现及隔离,且具有较少的开销。 Current research on Isolated execution environment could not provide both the integrity of program functionality and the recurrence of computing environment. To resolve this problem, this paper gives an improvement on current isolation techniques and puts forward a new program isolation technique model, named SVMM(Safe Virtual Machine Model), which performs better in the integrity of program functionality and the recurrence of computing environment and isolation while has relatively low overhead.
出处 《信息安全与通信保密》 2009年第8期203-205,共3页 Information Security and Communications Privacy
基金 四川省科技支撑计划资助项目(2008GZ0119).
关键词 虚拟机 非可信软件 计算环境重现 SVMM 隔离执行环境 virtual machine untrusted software execution environment reproduction safe virtual machine model: isolated execution environment
  • 相关文献

参考文献7

  • 1史美林,钱俊,董永乐.入侵检测技术与其发展趋势[J].信息安全与通信保密,2002(5):12-16. 被引量:12
  • 2Sun W, Liang Z, Sekar R, et al. One-way Isolation: An Effective Approach for Realizing Safe Execution Environments[C]// Proceedings of Network and Distributed Systems Security Symposium (NDSS' 05), San Diego, California, USA. USENIX Association Berkeley, CA, USA. 2005: 1-18.
  • 3Acharya A, Raje M. Mapbox: Using parameterized behavior classes to confine untrusted applications[J]. In Proc. 9th USENIX Security Symposium,[s. l.]: USENIX Association. 2000:1-17.
  • 4Suresh N C, Pau-chen C. BlueBox: A Policy-driven, Host-Based Intrusion Detection System [J]. ACM Transactions on Information and System Security (TISSEC). 2003, 6(2): 173-200.
  • 5Provos N. Improving Host Security with System Call Policies[C]//Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA:[s.n.], 2003: 257-271.
  • 6温研,王怀民.基于本地虚拟化技术的隔离执行模型研究[J].计算机学报,2008,31(10):1768-1779. 被引量:10
  • 7Peter Ferrie. Attacks on virtual machines[EB/OL]. (2009 6-3). http://www. symantec. com/ avcenter/ reference/ Virtual_ Machine_Threats. pdf.

二级参考文献34

  • 1Whitaker A, Shaw M, Gribble S D. Scale and performance in the denali isolation kernel//Proceedings of the 5th Symposium on Operating Systems ( SPECIAL ISSUE.. Virtual 2002, 36 Design and Implementation machines). Boston, USA,
  • 2Whitaker A, Cox R S, Shaw Met al. Constructing services with interposable virtual hardware//Proceedings of the 1st Symposium on Networked Systems Design and Implementation. San Francisco, California, USA, 2004: 13-26
  • 3Santhanam S, Elango P, Arpaci Dusseau A et al. Deploying virtual machines as sandboxes for the grid//Proceedings of the 2nd Workshop on Real, Large Distributed Systems. San Francisco, CA, 2005:7-12
  • 4Krsul I, Ganguly A, Zhang Jet al. VMPlants: Providing and managing virtual machine execution environments for grid eomputing//Proceedings of the ACM/IEEE Supercomputing 2004 Conference (SC'04). Washington, D, C. , USA, 2004 : 7
  • 5Waldspurger C A. Memory resource management in VMware ESX server//Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDIr 02). Boston, USA, 2002:181-194
  • 6Zhao X, Borders K, Prakash A. SVGrid: A secure virtual environment for untrusted grid applications//Proceedings of the ACM/IFIP/USENIX 6th International Middleware Conference. Grenoble, France, 2005:1-6
  • 7Barham P, Dragovic B, Fraser K et al. Xen and the art of virtualization//Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03). New York, 2003: 164 -177
  • 8Bellard F. QEMU, a fast and portable dynamic translator// Proceedings of the USENIX Annual Technical Conference (USENIX'05). Marriott Anaheim, USA,2005:41-46
  • 9Qumranet. KVM: Kernel-based Virtualization Driver, 2006
  • 10Uhlig R, Neiger G, Rodgers D et al. Intel virtualization technology. IEEE Computer, 2005, 38(5): 48-56

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部