메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 141-165

Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture

Author keywords

[No Author keywords available]

Indexed keywords

FUNDAMENTAL PROPERTIES; HARDWARE PLATFORM; HYPERVISOR; RESEARCH AGENDA; SECRECY PROPERTIES; SECURITY PROBLEMS; VIRTUALIZATIONS;

EID: 77954726625     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_10     Document Type: Conference Paper
Times cited : (16)

References (51)
  • 6
    • 77954727802 scopus 로고    scopus 로고
    • Secure virtual machine architecture reference manual
    • AMD64 virtualization rev. 3.01
    • AMD64 virtualization: Secure virtual machine architecture reference manual. AMD Publication no. 33047 rev. 3.01 (2005)
    • (2005) AMD Publication No. 33047
  • 7
    • 0004200684 scopus 로고
    • Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB
    • Anderson, J.P.: Computer security technology planning study. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB (1972)
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.P.1
  • 21
    • 77954694746 scopus 로고    scopus 로고
    • Intel virtualization technology specification for the IA-32 Intel architecture
    • April
    • Intel virtualization technology specification for the IA-32 Intel architecture. Intel Publication no. C97063-002 (April 2005)
    • (2005) Intel Publication No. C97063-002
  • 30
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. ACM Comm. 17 (1974)
    • (1974) ACM Comm. , vol.17
    • Popek, G.J.1    Goldberg, R.P.2
  • 32
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
    • Robin, J.S., Irvine, C.E.: Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In: Proc. USENIX Security Symposium (2000)
    • Proc. USENIX Security Symposium (2000)
    • Robin, J.S.1    Irvine, C.E.2
  • 36
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975)
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 37
    • 77954707179 scopus 로고    scopus 로고
    • Opteron exposed: Reverse engineering AMD K8 microcode updates
    • SecuriTeam
    • SecuriTeam. Opteron exposed: Reverse engineering AMD K8 microcode updates. SecuriTeam Security Reviews (2004)
    • (2004) SecuriTeam Security Reviews
  • 39
    • 70449824733 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • Sheshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proc. SOSP (2007)
    • Proc. SOSP (2007)
    • Sheshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 40
    • 77954743680 scopus 로고    scopus 로고
    • tboot
    • tboot. Trusted boot (2009), http://sourceforge.net/projects/tboot/
    • (2009) Trusted Boot
  • 41
    • 77954710762 scopus 로고    scopus 로고
    • P. Technologies. Phoenix securecore (2009), http://www.phoenix.com
    • (2009) Phoenix Securecore
  • 45
    • 77954749168 scopus 로고    scopus 로고
    • VMware. VMware ESX server system architecture (2009), http://www.vmware.com/support/esx21/doc/esx21-admin-system-architecture.html
    • (2009) VMware ESX Server System Architecture
  • 46
    • 77954754778 scopus 로고    scopus 로고
    • VMware Communities. ESX 3.5 or Xen 4.1? (2008), http://communities. vmware.com/message/900657
    • (2008) ESX 3.5 or Xen 4.1?
  • 51
    • 70350778763 scopus 로고    scopus 로고
    • XenSource Version 1.2 February
    • XenSource. Xen architecture overview. Version 1.2 (February 2008)
    • (2008) Xen Architecture Overview


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.