首页> 外文会议>Proceedings of the EuroSys 2012 conference >Isolating Commodity Hosted Hypervisors with HyperLock
【24h】

Isolating Commodity Hosted Hypervisors with HyperLock

机译:使用HyperLock隔离商品托管的虚拟机管理程序

获取原文
获取原文并翻译 | 示例

摘要

Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectively take advantage of the mature features and broad user bases of commodity oper-ating systems. However, they are not immune to exploitable software bugs. Particularly, due to the close integration with the host and the unique presence underneath guest virtual machines, a hosted hypervisor-if compromised - can also jeopardize the host system and completely take over all guests in the same physical machine. In this paper, we present HyperLock, a systematic ap-proach to strictly isolate privileged, but potentially vulnerable, hosted hypervisors from compromising the host OSs. Specifically, we provide a secure hypervisor isolation runtime with its own separated address space and a restricted instruction set for safe execution. In addition, we propose another technique, i.e., hypervisor shadowing, to efficiently create a separate shadow hypervisor and pair it with each guest so that a compromised hypervisor can affect only the paired guest, not others. We have built a proof-of-concept HyperLock prototype to confine the popular KVM hypervisor on Linux. Our results show that HyperLock has a much smaller (12%) trusted computing base (TCB) than the original KVM. Moreover, our system completely removes QEMU, the companion user program of KVM (with> 531K SLOC), from the TCB. The security experiments and performance measurements also demonstrated the practical-ity and effectiveness of our approach.
机译:托管虚拟机管理程序(例如KVM)正在广泛部署。主要原因之一是它们可以有效利用商品操作系统的成熟功能和广泛的用户基础。但是,他们不能幸免于可利用的软件错误。特别是,由于与主机的紧密集成以及来宾虚拟机下方的独特存在,如果托管的虚拟机管理程序遭到破坏,它也可能危害主机系统并完全接管同一物理机中的所有来宾。在本文中,我们介绍了HyperLock,这是一种系统的方法,可以严格隔离特权但有潜在漏洞的托管虚拟机管理程序,以免损害主机操作系统。具体来说,我们提供了一个安全的虚拟机管理程序隔离运行时,它具有自己独立的地址空间和受限制的指令集,以安全执行。另外,我们提出了另一种技术,即虚拟机管理程序影子,以有效地创建单独的影子虚拟机管理程序并将其与每个guest虚拟机配对,从而使受感染的虚拟机管理程序仅影响配对的guest虚拟机,而不会影响其他虚拟机。我们构建了概念验证的HyperLock原型,以将流行的KVM虚拟机管理程序限制在Linux上。我们的结果表明,HyperLock的可信计算库(TCB)比原始KVM小得多(12%)。此外,我们的系统从TCB中完全删除了QEMU(KVM的附带用户程序(> 531K SLOC))。安全性实验和性能评估也证明了我们方法的实用性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号