期刊文献+

基于虚拟机的内核完整性保护技术 被引量:5

A Kernel Integrity Protection Technology Based on Virtual Machine
下载PDF
导出
摘要 针对云计算中客户虚拟机内核完整性面临的威胁,该文提出了一种保护虚拟机内核完整性的技术—CTVM。该技术在KVM虚拟机环境中实现了虚拟化可信执行环境的创建,使多个客户虚拟机同时拥有可信计算功能,能对客户虚拟机提供启动完整性度量;在此基础上利用硬件辅助虚拟化技术,通过为客户虚拟机构造隔离的地址空间,使客户虚拟机中不可信模块与内核运行在逻辑隔离的地址空间。从这两个方面实现对客户虚拟机的启动和运行时的完整性保护。最后,以某国产服务器为实验平台实现了CTVM原型系统,系统测试与分析验证了技术的可用性,系统性能损耗在可接受的范围内。 For the kernel integrity threats of virtual machine in cloud computing environment, an integrity protecting technology of virtual machine kernel, cloud trusted virtual machine(CTVM ), is proposed. In the CTVM, the virtual trusted execution environment in kernel-based virtual machine(KVM) is created, the multiple virtual machines are endowed with a trusted computing function at the same time, and the guest virtual machines are provided with integrity measurement ability. By utilizing hardware virtualization technology, the untrusted kernel modules are isolated from operating system kernel through constructing isolated address space in guest virtual machines, so as to protect the booting integrity and runtime integrity of guest virtual machines. Finally, with a domestic server as the experimental platform, CTVM prototype system is presented. System test and analysis show that the system performance loss is within the acceptable range.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2015年第1期117-122,共6页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(61272447) 国家科技支撑计划(2012BAH18B05)
关键词 完整性 内核 KVM 可信计算 虚拟机 integrity kernel KVM trusted computing virtual machine
  • 相关文献

参考文献14

  • 1ROCHA F, CORREIA M. Lucy in the sky without diamonds: Stealing confidential data in the cloud[C]112011 IEEEIlFIP 41 st International Conference on Dependable Systems and Networks Workshops(DSN-W). Hong Kong, China: IEEE, 2011.
  • 2DOLAN-GAVITT B, LEEK T, ZHIVICH M, et al. Virtuoso: Narrowing the semantic gap in virtual machine introspection[C]112011 IEEE Symposium on Security and Privacy (SP). Berkeley, CA: IEEE, 2011.
  • 3CHEN X, GARFINKEL T, LEWIS E C, et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems[C]IlProceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating System. New York, USA: ACM, 2008.
  • 4CHEN H, CHEN J, MAO W, et al. Daonity-grid security from two levels of virtuaJization[J]. Information Security Technical Report, 2007,12(3): 123-138.
  • 5HOFMANN 0 S, KIM S, DUNN A M, et al. Inktag: Secure applications on an untrusted operating system[J]. ACM SIGPLAN Notices, 2013, 48(4): 265-278.
  • 6ZHANG F, CHEN J, CHEN H, et al. Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization[C]IlProceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. New York, USA: ACM, 2011.
  • 7BEN- YEHUDA M, DAY M D, DUBITZKY Z, et al. The turtles project: Design and implementation of nested virtualization[C]119th USENIX Symposium on Operation Systems Design and Impiementation(OSDI'10). Vancouver, BC: USENIX Association, 2010.
  • 8TOMLINSON A. Smart cards, tokens, security and applications[M]. New York, USA: Springer, 2008.
  • 9KORKL, JAGADPRAMANA P, MOWBRAY M, et al. Trustcloud: a framework for accountability and trust in cloud computing[C]112011 IEEE World Congress on Services. Washington, USA: IEEE, 2011.
  • 10SRIVASTAVA A, GIFFIN J T. Efficient monitoring of untrusted kernel-mode execution[C]1118th Annual Network & Distributed System Security Symposium. San Diego, USA: The Internet Society NDSS, 2011.

同被引文献30

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部