2010
DOI: 10.1007/978-3-642-14597-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Virtual Domains – Design, Implementation and Lessons Learned

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…Another related line of research leverages the trusted hardware to bootstrap entire platforms for secure software execution (e.g. Flicker [23], Trusted Virtual Domains [10], Haven [3]). These are large systems that are currently outside the scope of provable-security techniques.…”
Section: Other Related Workmentioning
confidence: 99%
“…Another related line of research leverages the trusted hardware to bootstrap entire platforms for secure software execution (e.g. Flicker [23], Trusted Virtual Domains [10], Haven [3]). These are large systems that are currently outside the scope of provable-security techniques.…”
Section: Other Related Workmentioning
confidence: 99%
“…Furthermore, these extensions protect DomC in a reasonable adversary model from any unauthorized access that tries to extract cryptographic material from the VM -either from a privileged management domain or from outside the VM. The flexible nature of DomC allows for building more advanced architectures, such as Trusted Virtual Domains [10], on top of our CaaS. Evaluation of full disk encryption with our reference implementation showed that DomC imposes a minimal performance overhead.…”
Section: Discussionmentioning
confidence: 99%
“…To make the same key available on all cloud nodes, we use migratable keys, i.e., its usage is bound to one or more trustworthy platform states but not a particular platform. For brevity, we omit the setup of this TPM key from our protocol and refer to related work [10]. An authenticated boot [35] measures the platform state, during boot.…”
Section: Detailed Image Setup Workflowmentioning
confidence: 99%
“…Excalibur [24] uses remote attestation and trusted platform module (TPM) sealing mechanisms to ensure proper execution environments of Virtual Machines (VMs) as they migrate within a datacenter. Trusted virtual domains [9], [10] extend trusted platform technology using virtualization to provide isolated execution environments that span multiple physical platforms. In [12], the authors consider information flow control across virtual domains within a single enterprise infrastructure.…”
Section: B Related Workmentioning
confidence: 99%