首页> 外文会议>International security protocols workshop >Security Limitations of Virtualization and How to Overcome Them
【24h】

Security Limitations of Virtualization and How to Overcome Them

机译:虚拟化的安全限制及其克服方法

获取原文

摘要

To be useful, security primitives must be available on commodity computers with demonstrable assurance and understandable by ordinary users with minimum effort. Trusted computing bases comprising a hypervisor, which implements the reference monitor, and virtual machines whose layered operating system services are formally verified, will continue to fail these criteria for client-side commodity computers. We argue that demonstrable high assurance will continue to elude commodity computers, and complex policies that require management of multiple subjects, object types, and permissions will continue to be misunderstood and misused by most users. We also argue that high-assurance, usable commodity computers require only two security primitives: partitions for isolated code execution, and trustworthy communication between partitions and between users and partitions. Usability requirements for isolated partitions are modest: users need to know when to use a small trusted system partition and when to switch to a larger untrusted one; developers need to isolate and assure only few security-sensitive code modules within an application; and security professionals needed to maintain only the trusted partition and a few isolated modules in the untrusted one. Trustworthy communication, which requires partitions and users to decide whether to accept input from or provide output to others, is more challenging because it requires trust, not merely secure (i.e., confidential and authentic) communication channels.
机译:要使用安全性,必须在商用计算机上提供安全性原语,并且具有可证明的保证,并且普通用户可以以最小的努力理解它们。包括实现参考监视器的虚拟机监控程序的可信计算库,以及经过正式验证其分层操作系统服务的虚拟机,将继续无法满足客户端商用计算机的这些标准。我们认为,可证明的高度保证将继续绕过商用计算机,而要求对多个主题,对象类型和权限进行管理的复杂策略将继续被大多数用户误解和滥用。我们还认为,高安全性,可用的商用计算机仅需要两个安全原语:用于隔离代码执行的分区,以及分区之间以及用户与分区之间的可信赖通信。隔离分区的可用性要求不高:用户需要知道何时使用较小的受信任系统分区以及何时切换到较大的不受信任的分区。开发人员只需要隔离和确保应用程序中很少有安全敏感的代码模块;安全专家只需维护受信任的分区,并在不受信任的分区中维护一些隔离的模块。需要分区和用户确定是否接受来自他人的输入或向他人提供输出的可信赖通信更具挑战性,因为它需要信任,而不仅仅是安全(即机密和真实)的通信通道。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号