期刊文献+

PriVisor:不可信操作系统中用户隐私数据保护方法 被引量:5

PriVisor: A Method for User Privacy Protection in Untrusted Operating System
下载PDF
导出
摘要 在目前网络越来越复杂的计算环境中,避免计算机中用户隐私数据的泄漏是研究人员关注的焦点。当前操作系统(operating system,OS)越来越复杂,恶意程序很容易通过其漏洞劫持操作系统,从而获取用户正在运行的应用程序所访问的数据,导致用户隐私数据的泄漏。以安全轻量虚拟机监控器OSV为基础,设计了一个用户隐私保护系统PriViso(rprivacy visor)。通过对操作系统内存访问进行限制,使操作系统在未经授权的情况下无法对用户隐私数据进行访问,从而保证了用户隐私数据的完整性。通过对设备配置空间的监控,建立安全I/O通道,保证被污染的操作系统无法通过对硬件设备的重配置,来获取用户与计算机进行交互时的敏感数据。对PriVisor的内存保护系统建立了模型,并对其进行了验证,保证了系统设计在理论上的安全可靠性。通过具体攻击实例的分析,验证了PriVisor可以有效地保护用户隐私不被攻击者窃取。 How to protect the user' s privacy data within the more and more complicated network environment catches the researchers' attention. The operating system (OS) is prone to be attacked for its complicated implementation. The attacker can hijack the OS kernel to steal the user' s privacy data by exploiting its vulnerabilities. This paper proposes a system named PriVisor (privacy visor) to protect the user' s private data based on a lightweight VMM (virtual machine monitor) named OSV. By limiting the OS memory access operation, the OS cannot access the user' s data if it is unau- thorized, which ensures the completeness of user' s privacy data. At the same time, this paper also builds a secure I/O channel by monitoring the device configuration space, which prevents the compromised OS reconfiguring the device configuration space to steal the user' s data when the user interacts with the computer. This paper verifies its security and reliability theoretically by modeling the memory protection system of PriVisor. The real attack case analysis confirms the effectiveness and security of PriVisor.l
出处 《计算机科学与探索》 CSCD 2013年第5期412-421,共10页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.60933003~~
关键词 隐私数据 虚拟机监控器 内存隔离 I O控制 privacy data virtual machine monitor memory isolation I/O contro
  • 相关文献

参考文献1

二级参考文献25

  • 1Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt 1, Warfield A. Xen and the ",krt of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles. 2003, 164-177.
  • 2Understanding Memory Resource Management in VMware ESX Server. VMWare white paper, www.vmware.com/files/pdf/perf- vsphere-memory management.pdf.
  • 3Klein G, Elphinstone K, Heiser G, Andronick J, Cock D, Derrin R Elkaduwe D, Engelhardt K, Kolanski R, Norrish M, Sewell T, Tuch H, Winwood S. seL4: formal verification of an OS kernel. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Princi- ples. 2009, 207 220.
  • 4Holzmann G J. The logic of bugs. In: Proceedings of Foundations of Software Engineering. 2002.
  • 5Gens F. IT cloud services user survey, part.2: top benefits & challenges. http://blogs.idc.com/ie/?p=210.
  • 6Boyd-Wickizer S, Chen H, Chen R, Mao Y, Kaashoek F, Morris R, Pesterev A, Stein L, Wu M, Dai Y. Corey: an operating system for many cores. In: Proceedings of the 8th USENIX Conference on Oper- ating Systems Design and Implementation. 2008, 43-57.
  • 7Engler D, Kaashoek M. Exokernel: an operating system architecture for application-level resource management. ACM SIGOPS Operating Systems Review, 1995, 29(5): 251-266.
  • 8Baumann A, Barham P, Dagand P, Harris T, Isaacs R, Peter S, Roscoe T, Schupbach A, Singhania A. The multikernel: a new OS architecture for scalable multicore systems. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. 2009, 29- 44.
  • 9Seshadri A, Luk M, Qu N, Perrig A. SecVisor: a tiny hypervisor to pro- vide lifetime kernel code integrity for commodity OSes. ACM SIGOPS Operating Systems Review, 2007, 41 (6): 335-350.
  • 10McCune J M, Li Y, Qu N, Zhou Z, Datta A, G|igor V, Perrig A. TrustVi- sor: efficient TCB reduction and attestation. IEEE Symposium on Se- curity and Privacy. 2010, 143-158.

共引文献3

同被引文献34

引证文献5

二级引证文献116

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部