Management of Integrity-Enforced Virtual Applications

作者: Michael Gissing , Ronald Toegl , Martin Pirker

DOI: 10.1007/978-3-642-22365-5_17

关键词: HypervisorVirtualizationRealization (systems)ArchitectureTrusted ComputingOperating systemProcess (engineering)Computer science

摘要: The security of virtualization platforms can be improved by applying trusted computing mechanisms such as enforcing the integrity hypervisor. In this paper we build on a recently proposed platform that extends trust to applications and services. We describe process covers fully integrity-enforcing life-cycle virtual application. Our architecture allows safe transition between states, even in case updates also detail technical realization our prototype implementation.

参考文章(16)
Ronald Toegl, Martin Pirker, Towards a Virtual Trusted Platform Journal of Universal Computer Science. ,vol. 16, pp. 531- 542 ,(2010)
Christian Stüble, Michael Waidner, James Riordan, Arnd Weber, Birgit Pfitzmann, The PERSEUS System Architecture Vieweg Verlag. ,(2001)
Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, Arnd Weber, Die PERSEUS Systemarchitektur Vieweg+Teubner Verlag, Wiesbaden. pp. 1- 17 ,(2001) , 10.1007/978-3-663-05918-9_1
Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan, None, Trusted Virtual Domains – Design, Implementation and Lessons Learned Trusted Systems. ,vol. 6163, pp. 156- 179 ,(2010) , 10.1007/978-3-642-14597-1_10
Martin Pirker, Ronald Toegl, Michael Gissing, Dynamic Enforcement of Platform Integrity Trust and Trustworthy Computing. pp. 265- 272 ,(2010) , 10.1007/978-3-642-13869-0_18
Ronald Toegl, Martin Pirker, Michael Gissing, acTvSM: a dynamic virtualization platform for enforcement of application integrity international conference on trusted systems. pp. 326- 345 ,(2010) , 10.1007/978-3-642-25283-9_22
Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick McDaniel, Justifying Integrity Using a Virtual Machine Verifier annual computer security applications conference. pp. 83- 92 ,(2009) , 10.1109/ACSAC.2009.18
Keith Adams, Ole Agesen, A comparison of software and hardware techniques for x86 virtualization Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII. ,vol. 34, pp. 2- 13 ,(2006) , 10.1145/1168857.1168860
Stefan Berger, Ramón Cáceres, Dimitrios Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan, TVDc: managing security in the trusted virtual datacenter Operating Systems Review. ,vol. 42, pp. 40- 47 ,(2008) , 10.1145/1341312.1341321
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, Adrian Perrig, TrustVisor: Efficient TCB Reduction and Attestation ieee symposium on security and privacy. pp. 143- 158 ,(2010) , 10.1109/SP.2010.17