首页> 外文期刊>ACM Computing Surveys >Virtualization: Issues, Security Threats, and Solutions
【24h】

Virtualization: Issues, Security Threats, and Solutions

机译:虚拟化:问题,安全威胁和解决方案

获取原文
获取原文并翻译 | 示例
       

摘要

Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the rapid deployment of commodity hardware and software systems. In principle, virtualization involves the use of an encapsulating software layer (Hypervisor or Virtual Machine Monitor) which surrounds or underlies an operating system and provides the same inputs, outputs, and behavior that would be expected from an actual physical device. This abstraction means that an ideal Virtual Machine Monitor provides an environment to the software equivalent to the host system, but which is decoupled from the hardware state. Because a virtual machine is not dependent on the state of the physical hardware, multiple virtual machines may be installed on a single set of hardware. The decoupling of physical and logical states gives virtualization inherent security benefits. However, the design, implementation, and deployment of virtualization technology have also opened up novel threats and security issues which, while not particular to system virtualization, take on new forms in relation to it. Reverse engineering becomes easier due to introspection capabilities, as encryption keys, security algorithms, low-level protection, intrusion detection, or antidebugging measures can become more easily compromised. Furthermore, associated technologies such as virtual routing and networking can create challenging issues for security, intrusion control, and associated forensic processes. We explain the security considerations and some associated methodologies by which security breaches can occur, and offer recommendations for how virtualized environments can best be protected. Finally, we offer a set of generalized recommendations that can be applied to achieve secure virtualized implementations.
机译:尽管系统虚拟化不是一个新的范例,但在现代系统体系结构中使用它的方式为系统构建提供了一个强大的平台,其优势只是近年来由于商用硬件的快速部署而得以实现。和软件系统。原则上,虚拟化涉及使用封装软件层(Hypervisor或Virtual Machine Monitor),该软件层围绕操作系统或位于操作系统之下,并提供与实际物理设备相同的输入,输出和行为。这种抽象意味着理想的虚拟机监视器为与主机系统等效的软件环境提供了环境,但该环境与硬件状态是分离的。因为虚拟机不依赖于物理硬件的状态,所以可以在单个硬件集上安装多个虚拟机。物理状态和逻辑状态的分离使虚拟化具有固有的安全优势。但是,虚拟化技术的设计,实施和部署也带来了新颖的威胁和安全问题,这些问题和安全问题虽然不仅仅针对系统虚拟化,但也呈现出与之相关的新形式。由于具有自省功能,因此逆向工程变得更加容易,因为加密密钥,安全算法,低级保护,入侵检测或反调试措施可以更容易受到损害。此外,诸如虚拟路由和网络之类的关联技术可能会给安全性,入侵控制以及关联的取证流程带来挑战。我们解释了安全注意事项和一些相关的方法,通过这些方法可以发生安全漏洞,并提供有关如何最好地保护虚拟化环境的建议。最后,我们提供了一组通用建议,这些建议可用于实现安全的虚拟化实施。

著录项

  • 来源
    《ACM Computing Surveys》 |2013年第2期|17.1-17.39|共39页
  • 作者单位

    Department of Computer Science and Software Engineering, The Univer-sity of Canterbury, Christchurch, New Zealand;

    Department of Com-puter Science and Information Technology, University of the District of Columbia, Washington, DC;

    Department of Computer Science and Software Engineering, The University of Canterbury, Christchurch, New Zealand;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Encryption; virtualization; threat; virtual machine; virtual machine monitor;

    机译:加密;虚拟化;威胁;虚拟机;虚拟机监视器;
  • 入库时间 2022-08-18 00:45:53

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号