메뉴 건너뛰기




Volumn 6, Issue 5, 2008, Pages 16-23

I/O for virtual machine monitors: Security and performance issues

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT SWITCHING; DEPARTMENT OF DEFENSES; DEVICE DRIVERS; HYPERVISIONS; HYPERVISOR; MAIN-FRAMES; OPERATING SYSTEMS; PARAVIRTUALIZATION; PERFORMANCE ISSUES; REAL HARDWARES; VIRTUAL MACHINE MONITORS; VIRTUAL PROCESSORS; VIRTUALIZATION;

EID: 54049158161     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.119     Document Type: Article
Times cited : (34)

References (31)
  • 3
    • 54049133255 scopus 로고
    • master's thesis, Dept. Computer Science, Univ. of California, Los Angeles
    • M.D. Vahey, A Virtualizer Efficiency Device, master's thesis, Dept. Computer Science, Univ. of California, Los Angeles, 1975.
    • (1975) A Virtualizer Efficiency Device
    • Vahey, M.D.1
  • 5
    • 85072542009 scopus 로고
    • A Security Retrofit of VM/370
    • AFIPS Press
    • B.D. Gold et al., "A Security Retrofit of VM/370," APIPS Conf. Proc., vol. 48, AFIPS Press, 1979, pp. 335-344.
    • (1979) APIPS Conf. Proc , vol.48 , pp. 335-344
    • Gold, B.D.1
  • 6
    • 0026254933 scopus 로고
    • A Retrospective on the VAX VMM Security Kernel
    • P.A. Karger et al., "A Retrospective on the VAX VMM Security Kernel," IEEE Trans. Software Eng., vol. 17, no. 11, 1991, pp. 1147-1165.
    • (1991) IEEE Trans. Software Eng , vol.17 , Issue.11 , pp. 1147-1165
    • Karger, P.A.1
  • 7
    • 0024874249 scopus 로고
    • Multiple Operating Systems on One Processor Complex
    • T.L. Borden, J.P. Heunessy, and J.W. Rymarczyk, "Multiple Operating Systems on One Processor Complex," IBM Systems J., vol. 28, no. 1, 1989, pp. 104-123.
    • (1989) IBM Systems J , vol.28 , Issue.1 , pp. 104-123
    • Borden, T.L.1    Heunessy, J.P.2    Rymarczyk, J.W.3
  • 8
    • 12344302980 scopus 로고    scopus 로고
    • J. Alves-Foss, C. Taylor, and P. Oman, A Multi-Layered Approach to Security in High Assurance Systems, Proc. 37th Hawaii Int'l Conf. System Sciences, IEEE CS Press, 2004, p. 90302.2b; http://csdl.computer.org/ comp/ proceedings/hicss/2004/2056/09/205690302b.pdf.
    • J. Alves-Foss, C. Taylor, and P. Oman, "A Multi-Layered Approach to Security in High Assurance Systems," Proc. 37th Hawaii Int'l Conf. System Sciences, IEEE CS Press, 2004, p. 90302.2b; http://csdl.computer.org/ comp/ proceedings/hicss/2004/2056/09/205690302b.pdf.
  • 9
    • 23844466980 scopus 로고    scopus 로고
    • MILS: Architecture for HighAssurance Embedded Computing
    • W.M. Vaufleet et al., "MILS: Architecture for HighAssurance Embedded Computing" Crosstalk: J. Defense Software Eng., vol. 18, no. 8, 2005, pp. 12-16; www.stsc.hill.af.mil/crosstalk/2005/08/0508Vanfleet_etal.pdf.
    • (2005) Crosstalk: J. Defense Software Eng , vol.18 , Issue.8 , pp. 12-16
    • Vaufleet, W.M.1
  • 10
    • 33744529805 scopus 로고    scopus 로고
    • Univ. of Illinois at Chicago
    • D.J. Bernstein, "Cache-Timing Attacks on AES," Univ. of Illinois at Chicago, 2005; http://cr.yp.to/autiforgery/ cachetiming-20050414. pdf.
    • (2005) Cache-Timing Attacks on AES
    • Bernstein, D.J.1
  • 13
    • 84944627047 scopus 로고    scopus 로고
    • Predicting Secret Keys via Brauch Prediction
    • Topics in Cryptology-CT-RSA 2007, Springer
    • O. Aciiçmez, Ç.K. Koç, and J.-P. Seifert, "Predicting Secret Keys via Brauch Prediction," Topics in Cryptology-CT-RSA 2007, LNCS 4377, Springer, 2007, pp. 225-242; http://security.ece.orst.edu/koc/papers/c39.pdf.
    • (2007) LNCS , vol.4377 , pp. 225-242
    • Aciiçmez, O.1    Koç, C.K.2    Seifert, J.-P.3
  • 14
    • 4544388201 scopus 로고    scopus 로고
    • Increased Information Flow Needs for High-Assurance Composite Evaluations
    • IEEE CS Press
    • P.A. Karger and H. Kurth. "Increased Information Flow Needs for High-Assurance Composite Evaluations," Proc. 2nd IEEE Int'l Information Assurance Workshop, IEEE CS Press, 2004, pp. 129-140.
    • (2004) Proc. 2nd IEEE Int'l Information Assurance Workshop , pp. 129-140
    • Karger, P.A.1    Kurth, H.2
  • 17
    • 79959681025 scopus 로고    scopus 로고
    • Low-Resource Routing Attacks against Tor
    • ACM Press
    • K. Bauer et al., "Low-Resource Routing Attacks against Tor," Proc. 2007 ACM Workshop Privacy in Electronic Society, , ACM Press, 2007, pp. 11-20; http://systems. cs.colorado.edu/%7Ebauerk/papers/wpes25-bauer.pdf.
    • (2007) Proc. 2007 ACM Workshop Privacy in Electronic Society , pp. 11-20
    • Bauer, K.1
  • 18
    • 84958951541 scopus 로고
    • Program Confinement in KVM/370
    • ACM Press
    • M.B Schaefer et al., "Program Confinement in KVM/370," Proc. ACM Annual Conf., ACM Press, 1977, pp. 404-410.
    • (1977) Proc. ACM Annual Conf , pp. 404-410
    • Schaefer, M.B.1
  • 19
    • 0034809926 scopus 로고    scopus 로고
    • Practical Server Privacy with Secure Coprocessors
    • S.W. Smith and D. Safford, "Practical Server Privacy with Secure Coprocessors," IBM Systems J., vol. 40, no. 3, 2001, pp. 683-695.
    • (2001) IBM Systems J , vol.40 , Issue.3 , pp. 683-695
    • Smith, S.W.1    Safford, D.2
  • 20
    • 54049158076 scopus 로고    scopus 로고
    • KVM: The Linux Virtual Machine Monitor
    • A. Kivity et al., "KVM: The Linux Virtual Machine Monitor," Proc. Linux Symp., vol. 1, 2007, pp. 225-230; http://ols.108.redhat.com/ 2007/Reprints/nakajima -Repriut.pdf.
    • (2007) Proc. Linux Symp , vol.1 , pp. 225-230
    • Kivity, A.1
  • 21
    • 54049139569 scopus 로고    scopus 로고
    • High-bandwidth Digital Content Protection System, rev. 1.3, Digital Content Protection, 2006; www.digital-cp.com/ files/static-page_files/ 8006F925-129D-4C12-C878 99B5A76EF5C3/HDCP_Specification%20Revl_3.pdf.
    • High-bandwidth Digital Content Protection System, rev. 1.3, Digital Content Protection, 2006; www.digital-cp.com/ files/static-page_files/ 8006F925-129D-4C12-C878 99B5A76EF5C3/HDCP_Specification%20Revl_3.pdf.
  • 22
    • 54049104898 scopus 로고
    • A Comparison of Trusted X Security Policies, Architectures, and Interoperability
    • IEEE CS Press
    • J. Picciotto and J. Epstein, "A Comparison of Trusted X Security Policies, Architectures, and Interoperability," Proc. 8th Ann. Computer Security Applications Conf., IEEE CS Press, 1992, pp. 142-152.
    • (1992) Proc. 8th Ann. Computer Security Applications Conf , pp. 142-152
    • Picciotto, J.1    Epstein, J.2
  • 23
    • 38149114073 scopus 로고    scopus 로고
    • publication no. 34434, Advanced Micro Devices
    • AMD I/O Virtualization Technology (IOMMU) Specification, publication no. 34434, Advanced Micro Devices, 2006; www.amd.com/us-en/assets/ content_type/white_papers_and_tech_docs/34434.pdf.
    • (2006) AMD I/O Virtualization Technology (IOMMU) Specification
  • 26
    • 54049154274 scopus 로고    scopus 로고
    • Intel Virtualization Technology Specification for the IA-32 Intel Architecture, C97063-002, Intel, 2005.
    • Intel Virtualization Technology Specification for the IA-32 Intel Architecture, C97063-002, Intel, 2005.
  • 28
    • 54049094761 scopus 로고    scopus 로고
    • Hybrid-VirtualizationEnhanced Virtualization for Linux
    • J. Nakajima and A.K. Mallick,"Hybrid-VirtualizationEnhanced Virtualization for Linux," Proc. Linux Symp., vol. 2, 2007, pp. 87-96; http://ols.108.redhat. com/2007/Reprints/nakajima-Reprint.pdf.
    • (2007) Proc. Linux Symp , vol.2 , pp. 87-96
    • Nakajima, J.1    Mallick, A.K.2
  • 29
    • 32044450263 scopus 로고    scopus 로고
    • Diagnosing Performance Overheads iu the Xeu Virtual Machine Environment
    • A. Menon et al., "Diagnosing Performance Overheads iu the Xeu Virtual Machine Environment," First ACM/ Usenix Conf on Virtual Execution Environments, 2005, pp. 13-23; www.hpl.hp.com/techreports/2005/ HPL-2005-80.pdf.
    • (2005) First ACM/ Usenix Conf on Virtual Execution Environments , pp. 13-23
    • Menon, A.1
  • 30
    • 38349079971 scopus 로고    scopus 로고
    • XenSocket: A High-Throughput Iuterdomaiu Transport for Virtual Machines
    • ACMI IFIP/USENIX 8th Int'l Middleware Conf, Springer
    • X. Zhang et al., "XenSocket: A High-Throughput Iuterdomaiu Transport for Virtual Machines," ACMI IFIP/USENIX 8th Int'l Middleware Conf., LNCS 4834, Springer, 2007, pp. 184-203.
    • (2007) LNCS , vol.4834 , pp. 184-203
    • Zhang, X.1
  • 31
    • 0038253143 scopus 로고
    • Improving Security and Performance for Capability Systems
    • no. 149, Univ. of Cambridge
    • P.A. Karger, Improving Security and Performance for Capability Systems, Computer Laboratory tech. report no. 149, Univ. of Cambridge, 1988; http://domino. research.ibm.coni/comni/research_people.nsf/pages/ karger.pubs.html/$FILE/trthesis.pdf.
    • (1988) Computer Laboratory tech. report
    • Karger, P.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.