메뉴 건너뛰기




Volumn , Issue , 2011, Pages 189-202

Breaking up is hard to do: Security and functionality in a commodity hypervisor

Author keywords

[No Author keywords available]

Indexed keywords

CO-LOCATED; CONFIGURABLE; HYPERVISOR; INDIVIDUAL COMPONENTS; LARGE AGGREGATES; LEAST PRIVILEGE; MICRO KERNEL; MULTI TENANTS; SERVICE COMPONENTS; SMALL SIZE; TRUSTED COMPUTING BASE; VIRTUALIZATIONS; WEB-BASED APPLICATIONS;

EID: 82655165294     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2043556.2043575     Document Type: Conference Paper
Times cited : (111)

References (47)
  • 3
    • 84976789801 scopus 로고
    • The recovery box: Using fast recovery to provide high availability in the UNIX environment
    • June
    • M. Baker and M. Sullivan. The recovery box: Using fast recovery to provide high availability in the UNIX environment. In Proc. USENIX Summer Conference, pages 31-43, June 1992.
    • (1992) Proc. USENIX Summer Conference , pp. 31-43
    • Baker, M.1    Sullivan, M.2
  • 5
    • 47249127725 scopus 로고    scopus 로고
    • The case for energy-proportional computing
    • December
    • L. A. Barroso and U. Hölzle. The case for energy-proportional computing. IEEE Computer, 40:33-37, December 2007.
    • (2007) IEEE Computer , vol.40 , pp. 33-37
    • Barroso, L.A.1    Hölzle, U.2
  • 6
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • Apr.
    • F. Bellard. QEMU, a fast and portable dynamic translator. In Proc. USENIX ATC, pages 41-46, Apr. 2005.
    • (2005) Proc. USENIX ATC , pp. 41-46
    • Bellard, F.1
  • 7
    • 85091966368 scopus 로고    scopus 로고
    • Wedge: Splitting applications into reduced-privilege compartments
    • Apr.
    • A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: splitting applications into reduced-privilege compartments. In Proc. 5th USENIX NSDI, pages 309-322, Apr. 2008.
    • (2008) Proc. 5th USENIX NSDI , pp. 309-322
    • Bittau, A.1    Marchenko, P.2    Handley, M.3    Karp, B.4
  • 9
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning programs for privilege separation
    • Aug.
    • D. Brumley and D. Song. Privtrans: automatically partitioning programs for privilege separation. In Proc. 13th USENIX Security Symposium, pages 57-72, Aug. 2004.
    • (2004) Proc. 13th USENIX Security Symposium , pp. 57-72
    • Brumley, D.1    Song, D.2
  • 16
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware analysis via hardware virtualization extensions
    • Oct.
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In Proc. 15th ACM CCS, pages 51-62, Oct. 2008.
    • (2008) Proc. 15th ACM CCS , pp. 51-62
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 20
    • 0007935332 scopus 로고
    • The KeyKOS architecture
    • October
    • N. Hardy. The KeyKOS architecture. Operating Systems Review, 19(4):8-25, October 1985.
    • (1985) Operating Systems Review , vol.19 , Issue.4 , pp. 8-25
    • Hardy, N.1
  • 23
    • 77954969841 scopus 로고    scopus 로고
    • NoHype: Virtualized cloud infrastructure without the virtualization
    • June
    • E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proc. 37th ACM ISCA, pages 350-361, June 2010.
    • (2010) Proc. 37th ACM ISCA , pp. 350-361
    • Keller, E.1    Szefer, J.2    Rexford, J.3    Lee, R.B.4
  • 24
    • 33646010754 scopus 로고    scopus 로고
    • Privman: A library for partitioning applications
    • June
    • D. Kilpatrick. Privman: A library for partitioning applications. In Proc. USENIX ATC, pages 273-284, June 2003.
    • (2003) Proc. USENIX ATC , pp. 273-284
    • Kilpatrick, D.1
  • 27
    • 20444377431 scopus 로고    scopus 로고
    • Udev: A userspace implementation of devfs
    • July
    • G. Kroah-Hartman. udev: A userspace implementation of devfs. In Proc. Linux Symposium, pages 263-271, July 2003.
    • (2003) Proc. Linux Symposium , pp. 263-271
    • Kroah-Hartman, G.1
  • 29
    • 79953169876 scopus 로고    scopus 로고
    • ReHype: Enabling VM survival across hypervisor failures
    • Mar.
    • M. Le and Y. Tamir. ReHype: Enabling VM survival across hypervisor failures. In Proc. 7th ACM VEE, pages 63-74, Mar. 2011.
    • (2011) Proc. 7th ACM VEE , pp. 63-74
    • Le, M.1    Tamir, Y.2
  • 31
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • June
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. USENIX ATC, pages 29-42, June 2001.
    • (2001) Proc. USENIX ATC , pp. 29-42
    • Loscocco, P.1    Smalley, S.2
  • 33
    • 77952329878 scopus 로고    scopus 로고
    • Improving Xen security through disaggregation
    • Mar.
    • D. G. Murray, G. Milos, and S. Hand. Improving Xen security through disaggregation. In Proc. 4th ACM VEE, pages 151-160, Mar. 2008.
    • (2008) Proc. 4th ACM VEE , pp. 151-160
    • Murray, D.G.1    Milos, G.2    Hand, S.3
  • 37
    • 78249261813 scopus 로고    scopus 로고
    • Using functional frogramming within an industrial product group: Perspectives and perceptions
    • Sept.
    • D. Scott, R. Sharp, T. Gazagnaire, and A. Madhavapeddy. Using functional frogramming within an industrial product group: perspectives and perceptions. In Proc. 15th ICFP, pages 87-92, Sept. 2010.
    • (2010) Proc. 15th ICFP , pp. 87-92
    • Scott, D.1    Sharp, R.2    Gazagnaire, T.3    Madhavapeddy, A.4
  • 38
    • 70449824733 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • Oct.
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proc. 21st ACM SOSP, pages 335-350, Oct. 2007.
    • (2007) Proc. 21st ACM SOSP , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 42
    • 77954565496 scopus 로고    scopus 로고
    • NOVA: A microhypervisor-based secure virtualization architecture
    • Apr.
    • U. Steinberg and B. Kauer. NOVA: a microhypervisor-based secure virtualization architecture. In Proc. 5th EuroSys, pages 209-222, Apr. 2010.
    • (2010) Proc. 5th EuroSys , pp. 209-222
    • Steinberg, U.1    Kauer, B.2
  • 43
    • 33646895419 scopus 로고    scopus 로고
    • Can we make operating systems reliable and secure?
    • DOI 10.1109/MC.2006.156
    • A. S. Tanenbaum, J. N. Herder, and H. Bos. Can we make operating systems reliable and secure? IEEE Computer, 39(5):44-51, May 2006. (Pubitemid 43786510)
    • (2006) Computer , vol.39 , Issue.5 , pp. 44-51
    • Tanenbaum, A.S.1    Herder, J.N.2    Bos, H.3
  • 44
    • 63149167330 scopus 로고    scopus 로고
    • Improving performance by embedding HPC applications in lightweight Xen domains
    • S. Thibault and T. Deegan. Improving performance by embedding HPC applications in lightweight Xen domains. In Proc. 2nd HPCVIRT, Mar. 2008.
    • Proc. 2nd HPCVIRT, Mar. 2008
    • Thibault, S.1    Deegan, T.2
  • 45
    • 77954743447 scopus 로고    scopus 로고
    • Analyzing the energy efficiency of a database server
    • June
    • D. Tsirogiannis, S. Harizopoulos, and M. A. Shah. Analyzing the energy efficiency of a database server. In Proc. ACM SIGMOD, pages 231-242, June 2010.
    • (2010) Proc. ACM SIGMOD , pp. 231-242
    • Tsirogiannis, D.1    Harizopoulos, S.2    Shah, M.A.3
  • 46
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Nov.
    • Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proc. 16th ACM CCS, pages 545-554, Nov. 2009.
    • (2009) Proc. 16th ACM CCS , pp. 545-554
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.