首页> 外文会议>ACM EuroSys conference on computer systems >Isolating Commodity Hosted Hypervisors with HyperLock
【24h】

Isolating Commodity Hosted Hypervisors with HyperLock

机译:隔离商品托管超锁的虚拟机管理程序

获取原文

摘要

Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectively take advantage of the mature features and broad user bases of commodity oper-ating systems. However, they are not immune to exploitable software bugs. Particularly, due to the close integration with the host and the unique presence underneath guest virtual machines, a hosted hypervisor-if compromised - can also jeopardize the host system and completely take over all guests in the same physical machine. In this paper, we present HyperLock, a systematic ap-proach to strictly isolate privileged, but potentially vulnerable, hosted hypervisors from compromising the host OSs. Specifically, we provide a secure hypervisor isolation runtime with its own separated address space and a restricted instruction set for safe execution. In addition, we propose another technique, i.e., hypervisor shadowing, to efficiently create a separate shadow hypervisor and pair it with each guest so that a compromised hypervisor can affect only the paired guest, not others. We have built a proof-of-concept HyperLock prototype to confine the popular KVM hypervisor on Linux. Our results show that HyperLock has a much smaller (12%) trusted computing base (TCB) than the original KVM. Moreover, our system completely removes QEMU, the companion user program of KVM (with> 531K SLOC), from the TCB. The security experiments and performance measurements also demonstrated the practical-ity and effectiveness of our approach.
机译:托管虚拟机管理程序(例如,KVM)正在广泛部署。一个关键原因是他们可以有效利用商品运营系统的成熟特征和广泛的用户基础。但是,它们并不免于利用可利用的软件错误。特别是,由于与主机的密切集成以及客户虚拟机下方的唯一存在,托管的虚拟机管理程序 - 如果妥协 - 也可以危及主机系统,并完全接管所有物理机器中的所有客人。在本文中,我们呈现超锁,系统的AP-Proach,严格隔离特权,但可能易受攻击,托管的虚拟机管理程序从损害主机OSS。具体而言,我们提供了一个安全的管理程序隔离运行时,其分离的地址空间和用于安全执行的受限指令集。此外,我们提出了另一种技术,即管理程序阴影,以有效地创建一个单独的影子虚拟机管理程序并将其与每个访客配对,以便妥协的虚拟机管理程序只能影响配对的访客,而不是其他客户端。我们建立了一个概念验证超锁原型,以限制Linux上的流行KVM虚拟机管理程序。我们的结果表明,超锁具有比原始KVM更小(12%)可信的计算基础(TCB)。此外,我们的系统完全删除了QEMU,KVM的伴随用户程序(用> 531K SLOC),来自TCB。安全实验和性能测量还表明了我们方法的实际效果和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号