2014 Seventh International Symposium on Computational Intelligence and Design 2014
DOI: 10.1109/iscid.2014.47
|View full text |Cite
|
Sign up to set email alerts
|

Embedded Trusted Computing Environment Build Based on QEMU Virtual Machine Architecture

Abstract: With the wide application of embedded technology and its products, much attention has been turned to the development of program to improve the safety and reliability of embedded devices. In this paper, we present a construct program of embedded trusted computing environment based on QEMU virtual machine architecture. The proposed program, simulates functions of trusted cryptographic modules by software, can not only fully consider the characteristics and design constraints of embedded systems, but also does no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…CTVM [14] is a kernel protection framework that adopts the hardware-assisted virtualization technology of extended page table to create the isolated operating environment for untrusted modules, and then monitors them during the runtime to protect the kernel integrity of guest VM. Zhang et al [15] presented a scheme of embedded trusted computing environment based on virtual machine architecture named QEMU, wherein the functions of trusted cryptographic modules are simulated by software, thus with no other additional hardware. Kumara et al [16] presented a virtual machine introspection (VMI) based on malicious process detection approach for VM, which extracted the high level information such as system call, opened known backdoor ports from introspected memory to identify the spurious process.…”
Section: Introductionmentioning
confidence: 99%
“…CTVM [14] is a kernel protection framework that adopts the hardware-assisted virtualization technology of extended page table to create the isolated operating environment for untrusted modules, and then monitors them during the runtime to protect the kernel integrity of guest VM. Zhang et al [15] presented a scheme of embedded trusted computing environment based on virtual machine architecture named QEMU, wherein the functions of trusted cryptographic modules are simulated by software, thus with no other additional hardware. Kumara et al [16] presented a virtual machine introspection (VMI) based on malicious process detection approach for VM, which extracted the high level information such as system call, opened known backdoor ports from introspected memory to identify the spurious process.…”
Section: Introductionmentioning
confidence: 99%