When U.S. Government drawings, spcifications. or other data are used for any p. nose other than a definitely related governr procurement eoperation, the government thereby incurs no responsibility not any obligation whatsoever; and tho fact that ths government may have formulated, furnished, or in any way supplied the said 4 drawings. spoecifications, or ether data is not to be regarded by implication or otherwise, as in any manner licensing the holder or any other person or corporamton, or conveying any rights or permission to manufacture, use, or sell any patented invention that may in any way be related thereto. Do not return this copy. Retain or destroy. REVIEW AND APPROVAL This technical report has been reviewed and is approved for publication.
Abstract-This paper describes the development of a virtualmachine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware, microcode, and software are aimed at meeting Al-level security requirements while maintaining the standard interfaces and applications of the VMS and ULTRIX-32 operating systems. The VAX Security Kernel supports multiple concurrent virtual machines on a single VAX system, providing isolation and controlled sharing of sensitive data. Rigorous engineering standards were applied during development to comply with the assurance requirements for verification and configuration management. The VAX Security Kernel has been developed with a heavy emphasis on performance and system management tools. The kernel performs sufficiently well that much of its development was carried out in virtual machines running on the kernel itself, rather than in a conventional time-sharing system. Index Terms -Computer security, virtual machines, covert channels, mandatory security, discretionary security, layered design, security kernels, protection rings.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.