期刊文献+

虚拟机隔离安全威胁浅析 被引量:1

原文传递
导出
摘要 随着虚拟机的广泛应用,虚拟机的安全性研究成为一个非常有意义的课题。本文分析了虚拟机隔离面临的安全威胁,并从硬件和网络两方面提出了安全防范措施。
出处 《保密科学技术》 2013年第1期31-34,共4页 Secrecy Science and Technology
关键词 虚拟机 安全 隔离
  • 相关文献

参考文献6

  • 1秦中元,沈日胜,张群芳,狄予兴.虚拟机系统安全综述[J].计算机应用研究,2012,29(5):1618-1622. 被引量:23
  • 2林昆,黄征.基于Intel VT-d技术的虚拟机安全隔离研究[J].信息安全与通信保密,2011,9(5):101-103. 被引量:10
  • 3Micka?l Salaün.Practical overview of a Xen covert channel[J].Journal in Computer Virology.2010(4)
  • 4Tim Mather,Subra Kumaraswamy,Shahed Latif.Cloud Securityand Privacy[]..2009
  • 5OKAMURA K,OYAMA Y.Load-based covert channels between Xenvirtual machines[].Proc of the th Annual ACM Symposium onApplied Computing.2010
  • 6Jeanna Neefe Matthews,Wenjin Hu,Madhujith Hapuarachchi,Todd Deshane,Demetrios Dimatos,Gary Hamilton,Michael McCabe,James Owens.Quantifying the Performance Isolation Properties of Virtualization Systems[]..2007

二级参考文献48

  • 1BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art ofVirtualization[J]. ACM, 2003(08): 164-177.
  • 2GARFINKEL T, ADAMS K, WARFIELD A, et al. Compatibility Is Not Transparency: Vmm Detection Myths and Realities[C]// HOTO'07: Proceedings of the 11thconfernee on Hot Topics in Operating Systems. NY, USA: ACM Press, 2007.
  • 3KARGER P. Performance and Security Lessons Learned from Virtualizing the Alpha processor[C]//ISCA '07 : Proceedings of the 34th Annual International Sysposium on Computer Architecture. New York, NY, USA: ACMPress, 2007: 392-401.
  • 4Secunia.com. Xen Multiple Vulnerabilities[EB/OL]. (2007-03-05) [2010-10-11]. http: //secunia.com/advisories/26986/.
  • 5TAVIS O. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments[EB/OL]. (2007-05-10)[2010- 10-15]. http : //taviso.decsystem.org/virtsec.pdf.
  • 6SAILER R, VALDEZ E, JAEGER T, et al. Shype: Secure Hypervisor Approach to Trusted Virtualized System[EB/OL]. (2005-07-05)[2010-10-20]. http: //citeseerx.ist.psu.edu/ viewdoc/download?doi= 10.1.1.120.5037&rep=rep 1 &type=pdf.
  • 7BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410.
  • 8WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101.
  • 9SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328.
  • 10PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28.

共引文献31

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部