메뉴 건너뛰기




Volumn , Issue , 2011, Pages 203-216

CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization

Author keywords

multi tenant cloud; nested virtualization; virtual machine security

Indexed keywords

COMPLEX TASK; HARDWARE SUPPORTS; MULTI TENANTS; OTHER APPLICATIONS; PERFORMANCE EVALUATION; PROTOTYPE SYSTEM; RESOURCE MANAGEMENT; SECURITY PROTECTION; SOFTWARE STACKS; VIRTUAL MACHINE MONITORS; VIRTUAL MACHINES; VIRTUALIZATION LAYERS; VIRTUALIZATION SOFTWARE; VIRTUALIZATIONS;

EID: 82655179240     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2043556.2043576     Document Type: Conference Paper
Times cited : (344)

References (72)
  • 3
    • 82655166372 scopus 로고    scopus 로고
    • Filevault in mac osx. http://www.apple.com/macosx/whatsnew/ features.html#filevault2.
    • Filevault in Mac Osx
  • 7
    • 82655178747 scopus 로고    scopus 로고
    • Amazon Inc. Amazon machine image. http://aws.amazon.com/amis, 2011.
    • (2011) Amazon Machine Image
  • 11
    • 78650019783 scopus 로고    scopus 로고
    • HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
    • A. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In Proc. CCS, pages 38-49, 2010.
    • (2010) Proc. CCS , pp. 38-49
    • Azab, A.1    Ning, P.2    Wang, Z.3    Jiang, X.4    Zhang, X.5    Skalsky, N.6
  • 14
    • 35348963573 scopus 로고    scopus 로고
    • Daonity - Grid security from two levels of virtualization
    • DOI 10.1016/j.istr.2007.05.005, PII S1363412707000258
    • H. Chen, J. Chen, W. Mao, and F. Yan. Daonity-grid security from two levels of virtualization. Information Security Technical Report, 12(3):123-138, 2007. (Pubitemid 47600054)
    • (2007) Information Security Technical Report , vol.12 , Issue.3 , pp. 123-138
    • Chen, H.1    Chen, J.2    Mao, W.3    Yan, F.4
  • 18
    • 84863391249 scopus 로고    scopus 로고
    • SR-IOV networking in Xen: Architecture, design and implementation
    • USENIX
    • Y. Dong, Z. Yu, and G. Rose. SR-IOV networking in Xen: Architecture, design and implementation. In Proc. Workshop on I/O virtualization. USENIX, 2008.
    • (2008) Proc. Workshop on I/O Virtualization
    • Dong, Y.1    Yu, Z.2    Rose, G.3
  • 19
    • 55549119760 scopus 로고    scopus 로고
    • Distributed caching with memcached
    • B. Fitzpatrick. Distributed caching with memcached. Linux journal, 2004.
    • (2004) Linux Journal
    • Fitzpatrick, B.1
  • 20
    • 77955886271 scopus 로고    scopus 로고
    • Flexiant Inc. Flexiscale public cloud. http://www. flexiant.com/products/ flexiscale/.
    • Flexiscale Public Cloud
  • 22
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: Security challenges in virtual machine based computing environments
    • T. Garfinkel and M. Rosenblum. When virtual is harder than real: Security challenges in virtual machine based computing environments. In Proc. HotOS, 2005.
    • Proc. HotOS, 2005
    • Garfinkel, T.1    Rosenblum, M.2
  • 24
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • R. Goldberg. Survey of virtual machine research. IEEE Computer, 7(6):34-45, 1974.
    • (1974) IEEE Computer , vol.7 , Issue.6 , pp. 34-45
    • Goldberg, R.1
  • 29
    • 38149053957 scopus 로고    scopus 로고
    • Out-of-the-box monitoring of VM-based high-interaction honeypots
    • X. Jiang and X. Wang. Out-of-the-box monitoring of VM-based high-interaction honeypots. In Proc. RAID, pages 198-218, 2007.
    • (2007) Proc. RAID , pp. 198-218
    • Jiang, X.1    Wang, X.2
  • 30
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
    • ACM
    • X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In Proc. CCS, pages 128-138. ACM, 2007.
    • (2007) Proc. CCS , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 31
    • 77954969841 scopus 로고    scopus 로고
    • NoHype: Virtualized cloud infrastructure without the virtualization
    • E. Keller, J. Szefer, J. Rexford, and R. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proc. ISCA, pages 350-361, 2010.
    • (2010) Proc. ISCA , pp. 350-361
    • Keller, E.1    Szefer, J.2    Rexford, J.3    Lee, R.4
  • 37
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In Proc. SOSP, pages 178-192, 2003.
    • (2003) Proc. SOSP , pp. 178-192
    • Lie, D.1    Thekkath, C.A.2    Horowitz, M.3
  • 38
  • 44
    • 77952329878 scopus 로고    scopus 로고
    • Improving Xen security through disaggregation
    • D. Murray, G. Milos, and S. Hand. Improving Xen security through disaggregation. In Proc. VEE, pages 151-160, 2008.
    • (2008) Proc. VEE , pp. 151-160
    • Murray, D.1    Milos, G.2    Hand, S.3
  • 45
    • 33846483949 scopus 로고    scopus 로고
    • Intel virtualization technology: Hardware support for efficient processor virtualization
    • G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal, 10(3):167-177, 2006.
    • (2006) Intel Technology Journal , vol.10 , Issue.3 , pp. 167-177
    • Neiger, G.1    Santoni, A.2    Leung, F.3    Rodgers, D.4    Uhlig, R.5
  • 48
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
    • R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Proc. RAID, pages 1-20, 2008.
    • (2008) Proc. RAID, 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 49
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • ACM
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. CCS, pages 199-212. ACM, 2009.
    • (2009) Proc. CCS , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 50
    • 34547941727 scopus 로고    scopus 로고
    • The official blog of the invisiblethings. org. June, 22
    • J. Rutkowska. Introducing Blue Pill. The official blog of the invisiblethings. org. June, 22, 2006.
    • (2006) Introducing Blue Pill
    • Rutkowska, J.1
  • 53
    • 70449824733 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proc. SOSP, 2007.
    • Proc. SOSP, 2007
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 54
    • 84885617227 scopus 로고    scopus 로고
    • Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proc. SOSP, pages 1-16, 2005.
    • (2005) Proc. SOSP , pp. 1-16
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    Van Doorn, L.5    Khosla, P.6
  • 56
    • 85029200033 scopus 로고    scopus 로고
    • Limiting cache-based side-channel in multi-tenant cloud using dynamic page
    • J. Shi, X. Song, H. Chen, and B. Zang. Limiting cache-based side-channel in multi-tenant cloud using dynamic page. In Proc. HotDep, 2011.
    • Proc. HotDep, 2011
    • Shi, J.1    Song, X.2    Chen, H.3    Zang, B.4
  • 58
    • 34748842601 scopus 로고    scopus 로고
    • Reducing TCB complexity for security-sensitive applications: Three case studies
    • L. Singaravelu, C. Pu, H. H "artig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: Three case studies. In Proc. Eurosys, 2006.
    • Proc. Eurosys, 2006
    • Singaravelu, L.1    Pu, C.2    Hartig, H.3    Helmuth, C.4
  • 59
    • 82655166362 scopus 로고    scopus 로고
    • SPEC. Specjbb 2005. http://www.spec.org/jbb2005/, 2005.
    • (2005) Specjbb 2005
  • 60
    • 77954565496 scopus 로고    scopus 로고
    • NOVA: A microhypervisor-based secure virtualization architecture
    • ACM
    • U. Steinberg and B. Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In Proc. Eurosys, pages 209-222. ACM, 2010.
    • (2010) Proc. Eurosys , pp. 209-222
    • Steinberg, U.1    Kauer, B.2
  • 62
    • 84872355901 scopus 로고    scopus 로고
    • T. R. Team
    • T. R. Team. Rackspace cloud. http://www.rackspacecloud.com/.
    • Rackspace Cloud
  • 63
    • 82655178723 scopus 로고    scopus 로고
    • Google fired employees for breaching user privacy
    • TechSpot News. Google fired employees for breaching user privacy. http://www.techspot.com/news/40280-google-fired-employees-for-breachinguser- privacy.html, 2010.
    • (2010) TechSpot News
  • 64
    • 82655168168 scopus 로고    scopus 로고
    • The Nimbus Team
    • The Nimbus Team. Nimbus project. http://www.nimbusproject.org/.
  • 66
    • 84870630391 scopus 로고    scopus 로고
    • Trusted Computing Group. Trusted platform module. http://www. trustedcomputinggroup.org/, 2010.
    • (2010) Trusted Platform Module
  • 67
    • 84978382687 scopus 로고    scopus 로고
    • Memory resource management in vmware esx server
    • C. A. Waldspurger. Memory resource management in vmware esx server. In Proc. OSDI, pages 181-194, 2002.
    • (2002) Proc. OSDI , pp. 181-194
    • Waldspurger, C.A.1
  • 68
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proc. S&P (Oakland), pages 380-395, 2010.
    • (2010) Proc. S&P (Oakland) , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 69
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • ACM
    • Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proc. CCS, pages 545-554. ACM, 2009.
    • (2009) Proc. CCS , pp. 545-554
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4
  • 70
    • 82655169608 scopus 로고    scopus 로고
    • jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components
    • C. Weinhold and H. Härtig. jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components. In Proc. Usenix ATC, 2011.
    • Proc. Usenix ATC, 2011
    • Weinhold, C.1    Härtig, H.2
  • 71
    • 77952404303 scopus 로고    scopus 로고
    • Using hypervisor to provide data secrecy for user applications on a per-page basis
    • J. Yang and K. G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In Proc. VEE, pages 71-80, 2008.
    • (2008) Proc. VEE , pp. 71-80
    • Yang, J.1    Shin, K.G.2
  • 72
    • 77952337533 scopus 로고    scopus 로고
    • Hardware enforcement of application security policies using tagged memory
    • N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies using tagged memory. In Proc. OSDI, pages 225-240, 2008.
    • (2008) Proc. OSDI , pp. 225-240
    • Zeldovich, N.1    Kannan, H.2    Dalton, M.3    Kozyrakis, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.