期刊文献+

虚拟机系统安全综述 被引量:23

Survey on virtual machine system security
下载PDF
导出
摘要 随着云计算的广泛应用,虚拟机技术得到了复苏和长足的发展,但同时也带来了新的安全威胁,因此对于虚拟机的安全威胁和防御的研究成为目前计算机安全界的研究热点。以目前广泛应用的虚拟机Xen为例,针对虚拟机的技术特征分析了所存在的漏洞和威胁,并从计算机安全学的角度提出了相应的防御和保护方法。较为全面地总结了目前国内外针对虚拟机安全各方面相关的研究成果,通过系统的比较分析,指出了目前存在的问题,探讨了下一步的研究方向。 With the widely spread of cloud computing,virtual machine technology revives and gets rapid development,meanwhile,new threats are also introduced.Researches on the threats and defenses of virtual machines have become a hot topic.This paper firstly analyzed the vulnerabilities and threats of virtual machines,taking Xen as an example.Secondly,it introduced the defense and protect methods which put forward to improve the security.Furthermore,it reviewed the state-of-the-art methods on the virtual machine security.Finally the paper discussed the existed problems and presented future directions.
出处 《计算机应用研究》 CSCD 北大核心 2012年第5期1618-1622,共5页 Application Research of Computers
基金 信息网络安全公安部重点实验室开放课题(C11605) 江苏省网络与信息安全重点实验室开放课题基金资助项目(BM2003201)
关键词 虚拟机 XEN 安全 防御 virtual machine Xen security defense
  • 相关文献

参考文献40

  • 1BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410.
  • 2WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101.
  • 3陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1309
  • 4SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328.
  • 5PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28.
  • 6冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1064
  • 7IDC.New IDC IT cloud services survey:top benefits and challenges[EB/OL].(2009-11-15).http://blogs.idc.com/ie/?p=730.
  • 8BARHAM P,DRAGOVIC B,FRASER S,et al.Xen and the art ofvirtualization[C]//Proc of the 19th ACM Symposium on OperatingSystems Principles.New York:ACM Press,2003:164-177.
  • 9ZHANG Xiao-tao,DONG Yao-zu.Optimizing Xen VMM based on In-telvirtualization technology[C]//Proc of International Conferenceon Internet Computing in Science and Engineering.Washington DC:IEEE Computer Society,2008:367-374.
  • 10BRATUS S,LOCASTO M E,RAMASWAMY A,et al.Traps,events,emulation,and enforcement:managing the Yin and Yang of virtualiza-tion-based security[C]//Proc of the 1st ACM Workshop on VirtualMachine Security.New York:ACM Press,2008:49-58.

二级参考文献63

  • 1张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:113
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Denning D E. An intrusion detection model[ J ]. IEEE Transaction on Software Engineering, 1987, 13 (2):222- 232.
  • 4Rosenblum, M Garfinkel. Virtual machine monitors: Current technology and future trends[ J ]. IEEE Computer, 2005,38 (5) : 3947.
  • 5Paul Barham, Boris Dragovic, Keir Fraser. Xen and the Art of Virtualization[ J]. The nineteenth ACM symposium on Operating Systems principles,2003,15(3) : 164 - 177.
  • 6Garfinkel T, Pfaff B, Chow J. A virtual machine- based plafform for trusted computing[J]. Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003, ( 1 ) : 69 - 75.
  • 7Laureano M, Maziero C, Jamhottr E. Protecting host- based intrusion detectors through virtual machines [ J ]. Computer Networks, 2007,3(7) : 1275 - 1283.
  • 8Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 9Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 10Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.

共引文献2294

同被引文献167

引证文献23

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部