메뉴 건너뛰기




Volumn , Issue , 2008, Pages 18-23

Virtual machines jailed: Virtualization in systems with small trusted computing bases

Author keywords

Microkernel; Secure systems; Small trusted computing base; Virtualization

Indexed keywords

CRITICAL COMPONENT; CRITICAL PARTS; LEGACY APPLICATIONS; MICROKERNEL; OPERATING SYSTEMS; PROTECTION DOMAINS; SECURE SYSTEMS; SENSITIVE APPLICATION; SMALL TRUSTED COMPUTING BASE; SOURCE CODE ACCESS; TRUSTED COMPUTING BASE; TRUSTED COMPUTING BASIS; VIRTUAL MACHINES; VIRTUALIZATION; VIRTUALIZATIONS;

EID: 70349159963     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1518684.1518688     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 1
    • 70349119636 scopus 로고    scopus 로고
    • KVM - Kernel-based Virtualiztion Machine. White paper, Qumranet Inc., 2006.
    • KVM - Kernel-based Virtualiztion Machine. White paper, Qumranet Inc., 2006.
  • 2
    • 70349135633 scopus 로고    scopus 로고
    • Mozilla foundation security advisories, 2009
    • Mozilla foundation security advisories, 2009.
  • 3
    • 70349139375 scopus 로고    scopus 로고
    • Vulnerability Report: Linux Kernel 2.6.x, 2009.
    • Vulnerability Report: Linux Kernel 2.6.x, 2009.
  • 4
    • 70349147114 scopus 로고    scopus 로고
    • Vulnerability Report: X Window System 11 (X11) 7.x, 2009.
    • Vulnerability Report: X Window System 11 (X11) 7.x, 2009.
  • 5
    • 70349155178 scopus 로고    scopus 로고
    • Advanced Micro Devices. AMD I/O Virtualization Technology (IOMMU) Specification, rev 1.20 edition, 2007.
    • Advanced Micro Devices. AMD I/O Virtualization Technology (IOMMU) Specification, rev 1.20 edition, 2007.
  • 6
    • 70349159683 scopus 로고    scopus 로고
    • Advanced Micro Devices. AMD64 Architecture Programmer's Manual 2: System Programming, rev 3.14 edition, 2007.
    • Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 2: System Programming, rev 3.14 edition, 2007.
  • 12
    • 77951450625 scopus 로고    scopus 로고
    • M. Hohmuth, M. Peter, H. Härtig, and J. Shapiro. Reducing TCB size by using untrusted components-small kernels versus virtual machine monitors. In in Proc. of the 11th ACM SIGOPS European Workshop, page 22. ACM Press, 2004.
    • M. Hohmuth, M. Peter, H. Härtig, and J. Shapiro. Reducing TCB size by using untrusted components-small kernels versus virtual machine monitors. In in Proc. of the 11th ACM SIGOPS European Workshop, page 22. ACM Press, 2004.
  • 15
    • 70349141082 scopus 로고    scopus 로고
    • Intel Corporation. Intel Virtualization Technology for Directed I/O, rev 1.2 edition, September 2008.
    • Intel Corporation. Intel Virtualization Technology for Directed I/O, rev 1.2 edition, September 2008.
  • 17
    • 70349091168 scopus 로고    scopus 로고
    • Estimating Defect Density Using Test Coverage
    • Technical report
    • Y. K. Malaiya, Y. K. Malaiya, J. Denton, and J. Denton. Estimating Defect Density Using Test Coverage. Technical report, 1998.
    • (1998)
    • Malaiya, Y.K.1    Malaiya, Y.K.2    Denton, J.3    Denton, J.4
  • 22
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 23
    • 34748842601 scopus 로고    scopus 로고
    • Reducing TCB complexity for security-sensitive applications: Three case studies
    • L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev., 40(4):161-174, 2006.
    • (2006) SIGOPS Oper. Syst. Rev , vol.40 , Issue.4 , pp. 161-174
    • Singaravelu, L.1    Pu, C.2    Härtig, H.3    Helmuth, C.4
  • 24
    • 34748842601 scopus 로고    scopus 로고
    • Reducing TCB complexity for security-sensitive applications: Three case studies
    • L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev., 40(4):161-174, 2006.
    • (2006) SIGOPS Oper. Syst. Rev , vol.40 , Issue.4 , pp. 161-174
    • Singaravelu, L.1    Pu, C.2    Härtig, H.3    Helmuth, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.