2010 IEEE Symposium on Security and Privacy 2010
DOI: 10.1109/sp.2010.17
|View full text |Cite
|
Sign up to set email alerts
|

TrustVisor: Efficient TCB Reduction and Attestation

Abstract: An important security challenge is to protect the execution of security-sensitive code on legacy systems from malware that may infect the OS, applications, or system devices. Prior work experienced a tradeoff between the level of security achieved and efficiency. In this work, we leverage the features of modern processors from AMD and Intel to overcome the tradeoff to simultaneously achieve a high level of security and high performance.We present TrustVisor, a special-purpose hypervisor that provides code inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
302
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 437 publications
(302 citation statements)
references
References 19 publications
0
302
0
Order By: Relevance
“…In addition, by sending out the data, HyperCheck has a lower overhead on the target machine compared to Flicker. To reduce the overhead of Flicker, TrustVisor [24] has a small footprint hypervisor to perform some cryptography operations. However, all the legacy applications should be ported for TrustVisor to work.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, by sending out the data, HyperCheck has a lower overhead on the target machine compared to Flicker. To reduce the overhead of Flicker, TrustVisor [24] has a small footprint hypervisor to perform some cryptography operations. However, all the legacy applications should be ported for TrustVisor to work.…”
Section: Related Workmentioning
confidence: 99%
“…Others developed new specialized prototype hypervisors [36,24]. However, having a small code base can only limit the code exposure and thus the attack surface of the hypervisor -it cannot provide strong guarantees about the code integrity of all the hypervisor components.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This trusted environment can be provisioned by either hardware (e.g., IBM 4767 PCIeCC2 [3], Intel SGX [4]) or hardwaresoftware combination [34,35]. Under this approach, data is stored in untrusted external memory/storage and protected by semantically secure encryption.…”
Section: Introductionmentioning
confidence: 99%
“…A number of valuable research projects observe that a sensitive application component, such as a random number generator or authentication module, requires little functionality, if any, from the OS, yet are vulnerable to failures of the OS [68,69]. These projects are beyond the scope of this paper, which instead focuses on systems that leverage virtualization to ensure security properties for applications that require legacy OS functionality.…”
Section: Introductionmentioning
confidence: 99%