为灵活高效的安全机制实现混合虚拟机监控

Junya Sawazaki, T. Maeda, A. Yonezawa
{"title":"为灵活高效的安全机制实现混合虚拟机监控","authors":"Junya Sawazaki, T. Maeda, A. Yonezawa","doi":"10.1109/PRDC.2010.32","DOIUrl":null,"url":null,"abstract":"Virtual machine monitors (VMMs) have emerged as potential tools %% are one of the promising approaches for implementing security mechanisms to enhance the security and/or reliability of software systems. There are two approaches to implementing VMMs. One is a software-based approach that emulates the execution of virtual machines via software. The other is a hardware-based approach that utilizes the hardware virtualization support of CPUs. The software-based approach is preferred for implementing security mechanisms, whereas the hardware-based approach is preferred from the viewpoint of performance. In this paper, we present an approach to implementing a hybrid VMM for flexible and efficient security mechanisms. The hybrid VMM consists of a software-based VMM (QEMU) and hardware-based VMM (KVM), and it dynamically switches between them. Using the hybrid VMM, security- and reliability-critical software can be executed on the software-based VMM, and performance-critical software can be executed on the hardware-based VMM. We also present the results of experiments conducted to evaluate the performance and verify the effectiveness of the hybrid VMM.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms\",\"authors\":\"Junya Sawazaki, T. Maeda, A. Yonezawa\",\"doi\":\"10.1109/PRDC.2010.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Virtual machine monitors (VMMs) have emerged as potential tools %% are one of the promising approaches for implementing security mechanisms to enhance the security and/or reliability of software systems. There are two approaches to implementing VMMs. One is a software-based approach that emulates the execution of virtual machines via software. The other is a hardware-based approach that utilizes the hardware virtualization support of CPUs. The software-based approach is preferred for implementing security mechanisms, whereas the hardware-based approach is preferred from the viewpoint of performance. In this paper, we present an approach to implementing a hybrid VMM for flexible and efficient security mechanisms. The hybrid VMM consists of a software-based VMM (QEMU) and hardware-based VMM (KVM), and it dynamically switches between them. Using the hybrid VMM, security- and reliability-critical software can be executed on the software-based VMM, and performance-critical software can be executed on the hardware-based VMM. We also present the results of experiments conducted to evaluate the performance and verify the effectiveness of the hybrid VMM.\",\"PeriodicalId\":382974,\"journal\":{\"name\":\"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PRDC.2010.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PRDC.2010.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

虚拟机监视器(vmm)已经成为潜在的工具%%是实现安全机制以增强软件系统的安全性和/或可靠性的有前途的方法之一。有两种实现vmm的方法。一种是基于软件的方法,通过软件模拟虚拟机的执行。另一种是基于硬件的方法,它利用cpu的硬件虚拟化支持。基于软件的方法是实现安全机制的首选方法,而从性能的角度来看,基于硬件的方法是首选方法。在本文中,我们提出了一种实现灵活高效安全机制的混合VMM的方法。混合VMM由基于软件的VMM (QEMU)和基于硬件的VMM (KVM)组成,并在两者之间动态切换。使用混合VMM,安全性和可靠性关键型软件可以在基于软件的VMM上执行,性能关键型软件可以在基于硬件的VMM上执行。我们还介绍了评估混合VMM性能和验证其有效性的实验结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms
Virtual machine monitors (VMMs) have emerged as potential tools %% are one of the promising approaches for implementing security mechanisms to enhance the security and/or reliability of software systems. There are two approaches to implementing VMMs. One is a software-based approach that emulates the execution of virtual machines via software. The other is a hardware-based approach that utilizes the hardware virtualization support of CPUs. The software-based approach is preferred for implementing security mechanisms, whereas the hardware-based approach is preferred from the viewpoint of performance. In this paper, we present an approach to implementing a hybrid VMM for flexible and efficient security mechanisms. The hybrid VMM consists of a software-based VMM (QEMU) and hardware-based VMM (KVM), and it dynamically switches between them. Using the hybrid VMM, security- and reliability-critical software can be executed on the software-based VMM, and performance-critical software can be executed on the hardware-based VMM. We also present the results of experiments conducted to evaluate the performance and verify the effectiveness of the hybrid VMM.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data Generation An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown Participants On the Reliability of Cascaded TMR Systems A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks Address Remapping for Static NUCA in NoC-Based Degradable Chip-Multiprocessors
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1