期刊文献+

虚拟化技术安全威胁与对策探讨 被引量:2

Discussion on security threats and Countermeasures of virtualization technology
下载PDF
导出
摘要 虚拟化作为一项基础性技术推动了云计算的快速发展和普及,同时也引入了一些新的安全挑战。从虚拟机逃逸、虚拟机跳跃、Hypervisor安全3个方面分析了虚拟化面临的安全威胁,从虚拟机隔离与访问控制、虚拟机安全加固和Hypervisor安全加固3个方面探讨了应对虚拟化安全威胁的对策措施,为构建虚拟化平台安全防护体系提供了有益参考。 As a basic technology, virtualization has promoted the rapid development and popularization of cloud computing, and has also introduced some new security challenges. The security threats facing virtualization are analyzed from 3 aspects: virtual machine escape, virtual machine jumping, and Hypervisor security. The countermeasures are discussed from 3 aspects: virtual machine isolation and access control, virtual machine security reinforcement and Hypervisor security reinforcement. It provides a useful reference for constructing the security protection system of virtualization platform.
作者 吉梁 程子栋 Ji Liang;Cheng Zi Dong(Computer Application Institute of Nuclear Industry,Infonnation Security Center,Beijing,100048,China;State Information Center,Deprtment of Public Technical Service,Beijing,100048,China)
出处 《信息通信》 2018年第12期171-173,共3页 Information & Communications
关键词 云计算 虚拟化 Hypervisor安全 虚拟机逃逸 虚拟机跳跃 虚拟机安全加固 Cloud computing virtualization Hypervisor security virtual machine escape virtual machine hopping virtual machine security reinforcement
  • 相关文献

参考文献2

二级参考文献8

  • 1BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art ofVirtualization[J]. ACM, 2003(08): 164-177.
  • 2GARFINKEL T, ADAMS K, WARFIELD A, et al. Compatibility Is Not Transparency: Vmm Detection Myths and Realities[C]// HOTO'07: Proceedings of the 11thconfernee on Hot Topics in Operating Systems. NY, USA: ACM Press, 2007.
  • 3KARGER P. Performance and Security Lessons Learned from Virtualizing the Alpha processor[C]//ISCA '07 : Proceedings of the 34th Annual International Sysposium on Computer Architecture. New York, NY, USA: ACMPress, 2007: 392-401.
  • 4Secunia.com. Xen Multiple Vulnerabilities[EB/OL]. (2007-03-05) [2010-10-11]. http: //secunia.com/advisories/26986/.
  • 5TAVIS O. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments[EB/OL]. (2007-05-10)[2010- 10-15]. http : //taviso.decsystem.org/virtsec.pdf.
  • 6SAILER R, VALDEZ E, JAEGER T, et al. Shype: Secure Hypervisor Approach to Trusted Virtualized System[EB/OL]. (2005-07-05)[2010-10-20]. http: //citeseerx.ist.psu.edu/ viewdoc/download?doi= 10.1.1.120.5037&rep=rep 1 &type=pdf.
  • 7贺青,王轶骏,薛质.基于Xen硬件虚拟机的虚拟蜜网研究[J].信息安全与通信保密,2008,30(6):83-85. 被引量:3
  • 8黄良良,韩军,汪伦伟.基于Xen硬件虚拟机的安全通信机制研究[J].计算机安全,2010(3):30-31. 被引量:5

共引文献9

同被引文献6

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部