2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2012
DOI: 10.1109/imis.2012.92
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Virtualization Technologies Focusing on Untrusted Code Execution

Abstract: In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hypervisor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Storage virtualization can be divided into virtualization based on storage device and network path. Redundant array of inexpensive disks (Raid) is a typical one which is based on the storage device [5][6][7][8][9][10]. It can implement a high performance disk fault tolerant storage space using number of physical disks.…”
Section: Storage Virtualizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Storage virtualization can be divided into virtualization based on storage device and network path. Redundant array of inexpensive disks (Raid) is a typical one which is based on the storage device [5][6][7][8][9][10]. It can implement a high performance disk fault tolerant storage space using number of physical disks.…”
Section: Storage Virtualizationmentioning
confidence: 99%
“…The preconditions to execute the above process are as follow: (1) CPU must support multiple privilege levels. (2) Nonsensitive instruction execution result should be kept independent of CPU's Privilege level [5][6][7][8][9][10][11][12][13]. (3) CPU is able to provide a protective mechanism to achieve isolation among physical machines and virtual machines [14].…”
Section: Problems Of System Virtualizationmentioning
confidence: 99%
“…Type I is known as Full virtualization where VMM is interfacing directly with the system hardware this type of architecture is also called as native architecture [6], Figure 1. Type II is not interfacing directly with the hardware of the system, rather it runs as an application alongside with the host OS.…”
Section: Types Of Virtualizationmentioning
confidence: 99%
“…Depending on the design of the operating systems, the risks can range from impacting an individual user account to destroying the whole computer system. There have been a great many efforts [1]- [3], to name a few, to minimize in general the security risks to maintain the system integrity or data confidentiality. However, it is well understood that it is in principle undeterminable whether an arbitrary program contains a computer virus, and in fact deliberate attacks can even lurk within a regular web advertising [4].…”
Section: Introductionmentioning
confidence: 99%
“…Hence a more wholistic approach in the form of virtual execution environment or virtualization techniques has been widely adopted in the recent times, see e.g. [3], [8]. Of course, sandboxing and virtualization are not the only valid techniques [9] and neither can they address all execution protections.…”
Section: Introductionmentioning
confidence: 99%