首页> 外文期刊>IEEE transactions on dependable and secure computing >Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems
【24h】

Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems

机译:基于虚拟化的安全系统框架SecPod的设计与实现

获取原文
获取原文并翻译 | 示例

摘要

The OS kernel is critical to the security of a computer system. Many systems have been proposed to improve its security. A fundamental weakness of those systems is that page tables, the data structures that control the memory protection, are not isolated from the vulnerable kernel, and thus subject to tampering. To address that, researchers have relied on virtualization for reliable kernel memory protection. Unfortunately, such memory protection requires to monitor every update to the guest's page tables. This fundamentally conflicts with the recent advances in the hardware virtualization support. In this paper, we present the design and implementation of SecPod, a practical and extensible framework for virtualization-based security systems that can provide both strong isolation and the compatibility with modern hardware. SecPod has two key techniques: paging delegation delegates and audits the kernel's paging operations to a secure space; execution trapping intercepts the (compromised) kernel's attempts to subvert SecPod by misusing privileged instructions. We have implemented a prototype of SecPod based on KVM. Our experiments show that SecPod is both effective and efficient.
机译:OS内核对于计算机系统的安全至关重要。已经提出了许多系统来提高其安全性。这些系统的根本缺点是页表(控制内存保护的数据结构)没有与易受攻击的内核隔离,因此容易受到篡改。为了解决这个问题,研究人员依靠虚拟化来提供可靠的内核内存保护。不幸的是,这种内存保护要求监视来宾的页表的每次更新。这从根本上与硬件虚拟化支持的最新进展相冲突。在本文中,我们介绍了SecPod的设计和实现,SecPod是基于虚拟化的安全系统的实用且可扩展的框架,可以提供强大的隔离性以及与现代硬件的兼容性。 SecPod具有两项关键技术:分页委派委托和将内核的分页操作审核到安全的空间;执行陷阱通过滥用特权指令来拦截(受损的)内核破坏SecPod的尝试。我们已经实现了基于KVM的SecPod原型。我们的实验表明SecPod既有效又高效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号