Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2421011
|View full text |Cite
|
Sign up to set email alerts
|

Separation virtual machine monitors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Hypervisors support COTS operating systems and legacy/diverse applications on specific operating systems. Hypervisors for safety and securitycritical systems have been widely discussed [78,79]. For instance, Xtratum [80] is a typical hypervisor for safety-critical embedded systems.…”
Section: • Arinc 653 Compliant Separation Kernelsmentioning
confidence: 99%
“…Hypervisors support COTS operating systems and legacy/diverse applications on specific operating systems. Hypervisors for safety and securitycritical systems have been widely discussed [78,79]. For instance, Xtratum [80] is a typical hypervisor for safety-critical embedded systems.…”
Section: • Arinc 653 Compliant Separation Kernelsmentioning
confidence: 99%
“…A defining feature of hypervisor architectures is the arrangement of security rings [4]. A security ring is a hierarchical level of privilege within a computer system [5].…”
Section: Security Ringsmentioning
confidence: 99%
“…The monitoring interface allows external devices to query a hypervisor, receive metrics of system state, prepare virtual machine performance reports, or poll hardware. Attackers would be interested in tapping into the monitoring system and changing reported metrics [4]. They could underreport system load in order to hide illicit activities.…”
Section: Monitoringmentioning
confidence: 99%
“…Candidates include the NRL Xenon hypervisor [9,6,8], which is still in development, and the commercially available Citrix XenClient XT [2]. Announced in May 2011, XenClient XT leverages NSA's Xen Security Modules (XSM) [3] and SELinux, Intel's Virtualization Technology for Directed I/O (VT-d), Extended Page Tables and Trust Platform Module (TPM)/Trusted Execution Technologies (TXT) to improve VM isolation and to provide a root of trust.…”
Section: Layer 1: Trustworthy Vmm To Isolate Vmsmentioning
confidence: 99%