期刊文献+

基于Intel VT-d技术的虚拟机安全隔离研究 被引量:10

Study on Virtual Machine Security Isolation based on Intel VT-d
原文传递
导出
摘要 资源隔离是计算机安全的一个重要手段,良好的安全隔离使得虚拟机技术成为近年来学术界和工业界的热点。在深入分析Linux环境下Xen完全虚拟化技术理论的基础上,设计了一个基于IntelVT技术的虚拟机安全隔离设计方案。该方案通过安全内存管理(SMM)和安全I/O管理(SIOM)两种手段进行保护,完善了Xen宿主机系统与虚拟机系统之间的安全隔离,为Xen虚拟机在实际的安全隔离环境中的应用提供了较高的安全保障。 Resource isolation mechanisms are very important for computer security,and virtual machine technology becomes very popular in research communities and industries owing to its fair isolation solution in computer system.Through theoretical analysis of Xen virtualization in Linux,this paper proposed a solution for security isolation of virtual machines based on Intel VT,which could achieve security isolation of Xen host machine and virtual machines through secure memory management(SMM) and secure I/O management(SIOM),thus offering an even higher security guarantee for the application of Xen in security isolation environment.
作者 林昆 黄征
出处 《信息安全与通信保密》 2011年第5期101-103,共3页 Information Security and Communications Privacy
关键词 虚拟化 XEN VT-d技术 虚拟机隔离 virtualization Xen VT-d virtual machine isolation
  • 相关文献

参考文献8

  • 1BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art ofVirtualization[J]. ACM, 2003(08): 164-177.
  • 2黄良良,韩军,汪伦伟.基于Xen硬件虚拟机的安全通信机制研究[J].计算机安全,2010(3):30-31. 被引量:5
  • 3贺青,王轶骏,薛质.基于Xen硬件虚拟机的虚拟蜜网研究[J].信息安全与通信保密,2008,30(6):83-85. 被引量:3
  • 4GARFINKEL T, ADAMS K, WARFIELD A, et al. Compatibility Is Not Transparency: Vmm Detection Myths and Realities[C]// HOTO'07: Proceedings of the 11thconfernee on Hot Topics in Operating Systems. NY, USA: ACM Press, 2007.
  • 5KARGER P. Performance and Security Lessons Learned from Virtualizing the Alpha processor[C]//ISCA '07 : Proceedings of the 34th Annual International Sysposium on Computer Architecture. New York, NY, USA: ACMPress, 2007: 392-401.
  • 6Secunia.com. Xen Multiple Vulnerabilities[EB/OL]. (2007-03-05) [2010-10-11]. http: //secunia.com/advisories/26986/.
  • 7TAVIS O. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments[EB/OL]. (2007-05-10)[2010- 10-15]. http : //taviso.decsystem.org/virtsec.pdf.
  • 8SAILER R, VALDEZ E, JAEGER T, et al. Shype: Secure Hypervisor Approach to Trusted Virtualized System[EB/OL]. (2005-07-05)[2010-10-20]. http: //citeseerx.ist.psu.edu/ viewdoc/download?doi= 10.1.1.120.5037&rep=rep 1 &type=pdf.

二级参考文献13

  • 1朱鸿伟.虚拟化安全关键技术研究.浙江大学,2008.5.14.
  • 2The Xen Tea, m University of Cambridge,UK. Users' Manual Xen v3.0.
  • 3余珂,杨晓伟.Xen虚拟I/O设备实现与性能分析.
  • 4George Coker .Xen Security Modules (XSM).Nationai Information Assurance Research Lab National Security Agency (NSA).
  • 5D Abrarnson,J jackson,S Muthrasanallur.Intel virtualization technology for directed I/O.Intel Technology Journal,2006.
  • 6李超,郭晓琼.Xen中的I/O操作[技术报告].上海:上海交通大学.2007.
  • 7赵凡.VMX虚拟机设备模型设计研究与虚拟网卡实现.南京理工大学,2006.6.
  • 8[1]The Honeynet Project:Know Your Enemy:Honeynets[DB/OL].http://www.honeynetorg/papers/honeynet/,2005.
  • 9[2]The Honeynet Project:Know Your Enemy:Defining Virtual Honeynet[DB/OL].http://www.honeynet.org/papers/virtual/,2003.
  • 10[3]Quynh N A,Takefuji Y.Towards an Invisible Honeypot Monitoring System[C].ACISP,2006.

共引文献6

同被引文献73

引证文献10

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部