메뉴 건너뛰기




Volumn , Issue , 2012, Pages 437-449

Architectural support for hypervisor-secure virtualization

Author keywords

attestation; cloud computing; computer architecture; confidentiality; hardware security; hypervisor; integrity; security; trust evidence; virtualization

Indexed keywords

ATTESTATION; CONFIDENTIALITY; HARDWARE SECURITY; HYPERVISOR; INTEGRITY; SECURITY; TRUST EVIDENCE; VIRTUALIZATIONS;

EID: 84858773328     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2150976.2151022     Document Type: Conference Paper
Times cited : (126)

References (47)
  • 1
    • 84858781462 scopus 로고    scopus 로고
    • Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/.
  • 2
    • 84858787776 scopus 로고    scopus 로고
    • AMD Virtualization (AMD-V) Technology. http://sites.amd.com/us/business/ it-solutions/virtualization/Pages/amd-v.aspx.
  • 5
    • 84858779456 scopus 로고    scopus 로고
    • Intel Virtualization Technology, . http://www.intel.com/technology/itj/ 2006/v10i3/1-hardware/6-vt-x-vt-i-solutions.htm.
  • 10
    • 84858779455 scopus 로고    scopus 로고
    • Oracle VM Server For SPARC. http://www.oracle.com/us/oraclevm-sparc-ds- 073441.pdf.
  • 11
    • 77954408441 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG TPM Specification. http://www. trustedcomputinggroup.org/.
    • TCG TPM Specification
  • 12
    • 84858787777 scopus 로고    scopus 로고
    • VMWare. http://www.vmware.com/.
  • 14
    • 84858779453 scopus 로고    scopus 로고
    • Xen. http://www.xen.org.
  • 17
  • 21
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • May ISBN 978-1-60558-506-2. doi: http: //doi.acm.org/10.1145/1536414. 1536440
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In Proc. of the annual Symposium on Theory of Computing, STOC, pages 169-178, May 2009. ISBN 978-1-60558-506-2. doi: http: //doi.acm.org/10.1145/1536414.1536440. URL http://doi.acm.org/10.1145/1536414.1536440.
    • (2009) Proc. of the Annual Symposium on Theory of Computing, STOC , pp. 169-178
    • Gentry, C.1
  • 24
    • 67650146012 scopus 로고    scopus 로고
    • Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
    • Information Security and Cryptology
    • M. Kim, J. Ryou, and S. Jun. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. In Information Security and Cryptology, volume 5487 of Lecture Notes in Computer Science, pages 240-252. 2009.
    • (2009) Lecture Notes in Computer Science , vol.5487 , pp. 240-252
    • Kim, M.1    Ryou, J.2    Jun, S.3
  • 26
    • 77954729866 scopus 로고    scopus 로고
    • Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
    • Trust and Trustworthy Computing
    • F. Krautheim, D. Phatak, and A. Sherman. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In Trust and Trustworthy Computing, volume 6101 of Lecture Notes in Computer Science, pages 211-227. 2010.
    • (2010) Lecture Notes in Computer Science , vol.6101 , pp. 211-227
    • Krautheim, F.1    Phatak, D.2    Sherman, A.3
  • 31
    • 77957959132 scopus 로고    scopus 로고
    • Secure Virtual Machine Execution under an Untrusted Management OS
    • July doi
    • C. Li, A. Raghunathan, and N. K. Jha. Secure Virtual Machine Execution under an Untrusted Management OS. Proc. of the IEEE International Conference on Cloud Computing, pages 172-179, July 2010. doi: http://doi.ieeecomputersociety. org/10.1109/CLOUD.2010.29.
    • (2010) Proc. of the IEEE International Conference on Cloud Computing , pp. 172-179
    • Li, C.1    Raghunathan, A.2    Jha, N.K.3
  • 33
    • 72949120122 scopus 로고    scopus 로고
    • KvmSec: A security extension for Linux kernel virtual machines
    • March ISBN 978-1-60558-166-8. doi
    • F. Lombardi and R. Di Pietro. KvmSec: a security extension for Linux kernel virtual machines. In Proc. of the 2009 ACM Symposium on Applied Computing, SAC, pages 2029-2034, March 2009. ISBN 978-1-60558-166-8. doi: http://doi.acm.org/10.1145/1529282.1529733.
    • (2009) Proc. of the 2009 ACM Symposium on Applied Computing, SAC , pp. 2029-2034
    • Lombardi, F.1    Di Pietro, R.2
  • 36
    • 79959706339 scopus 로고    scopus 로고
    • Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers
    • ISSN 1063-8210. doi: 10.1109/TVLSI.2010.2049037
    • A. Miyamoto, N. Homma, T. Aoki, and A. Satoh. Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, (99):1-11, 2010. ISSN 1063-8210. doi: 10.1109/TVLSI.2010.2049037.
    • (2010) IEEE Transactions on Very Large Scale Integration (VLSI) Systems , Issue.99 , pp. 1-11
    • Miyamoto, A.1    Homma, N.2    Aoki, T.3    Satoh, A.4
  • 39
    • 1142280988 scopus 로고    scopus 로고
    • AEGIS: Architecture for tamper-evident and tamper-resistant processing
    • June ISBN 1-58113-733-8. doi: http://doi.acm.org/10.1145/782814.782838
    • G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: architecture for tamper-evident and tamper-resistant processing. In Proc. of the 17th annual International Conference on Supercomputing, ICS, pages 160-171, June 2003. ISBN 1-58113-733-8. doi: http://doi.acm.org/10.1145/782814.782838. URL http://doi.acm.org/10.1145/782814.782838.
    • (2003) Proc. of the 17th Annual International Conference on Supercomputing, ICS , pp. 160-171
    • Suh, G.E.1    Clarke, D.2    Gassend, B.3    Van Dijk, M.4    Devadas, S.5
  • 42
    • 77954726625 scopus 로고    scopus 로고
    • Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
    • June ISBN 3-642-13868-3, 978-3-642-13868-3
    • A. Vasudevan, J. M. McCune, N. Qu, L. Van Doorn, and A. Perrig. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture. In Proc. of the 3rd international conference on Trust and Trustworthy Computing, TRUST, pages 141-165, June 2010. ISBN 3-642-13868-3, 978-3-642-13868-3. URL http://portal.acm.org/citation.cfm?id=1875652.1875663.
    • (2010) Proc. of the 3rd International Conference on Trust and Trustworthy Computing, TRUST , pp. 141-165
    • Vasudevan, A.1    McCune, J.M.2    Qu, N.3    Van Doorn, L.4    Perrig, A.5
  • 43
    • 84978382687 scopus 로고    scopus 로고
    • Memory resource management in VMware ESX server
    • December ISSN 0163-5980. doi: http://doi.acm.org/10.1145/844128.844146
    • C. A. Waldspurger. Memory resource management in VMware ESX server. SIGOPS Oper. Syst. Rev., 36:181-194, December 2002. ISSN 0163-5980. doi: http://doi.acm.org/10.1145/844128.844146. URL http://doi.acm.org/10.1145/844128. 844146.
    • (2002) SIGOPS Oper. Syst. Rev. , vol.36 , pp. 181-194
    • Waldspurger, C.A.1
  • 44
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
    • May doi: 10.1109/SP.2010.30
    • Z. Wang and X. Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In Proc. of the 2010 IEEE Symposium on Security and Privacy, S&P, pages 380 -395, May 2010. doi: 10.1109/SP.2010.30.
    • (2010) Proc. of the 2010 IEEE Symposium on Security and Privacy, S&P , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 46
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Nov. ISBN 978-1-60558-894-0. doi
    • Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proc. of the conference on Computer and Communications Security, CCS, pages 545-554, Nov. 2009. ISBN 978-1-60558-894-0. doi: http://doi.acm.org/10.1145/1653662.1653728.
    • (2009) Proc. of the Conference on Computer and Communications Security, CCS , pp. 545-554
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.