Isolating commodity hosted hypervisors with HyperLock
暂无分享,去创建一个
[1] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[2] F. O R M A T I O N G U I D. Timekeeping in VMware Virtual Machines , 2004 .
[3] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[4] Emin Gün Sirer,et al. Device Driver Safety Through a Reference Validation Mechanism , 2008, OSDI.
[5] Rusty Russell,et al. virtio: towards a de-facto standard for virtual I/O devices , 2008, OPSR.
[6] Silas Boyd-Wickizer,et al. Tolerating Malicious Device Drivers in Linux , 2010, USENIX Annual Technical Conference.
[7] Jun Zhu,et al. Breaking up is hard to do: security and functionality in a commodity hypervisor , 2011, SOSP.
[8] ともやん. KVM (Kernel-based Virtual Machine) - 仮想化 , 2009 .
[9] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[10] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[11] Xi Wang,et al. Software fault isolation with API integrity and multi-principal modules , 2011, SOSP.
[12] Abhinav Srivastava,et al. Efficient Monitoring of Untrusted Kernel-Mode Execution , 2011, NDSS.
[13] Bryan Ford,et al. Vx32: Lightweight User-level Sandboxing on the x86 , 2008, USENIX Annual Technical Conference.
[14] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[15] Donghai Tian,et al. Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions , 2011, NDSS.
[16] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[17] Jennifer Rexford,et al. Eliminating the hypervisor attack surface for a more secure cloud , 2011, CCS '11.
[18] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[19] Somesh Jha,et al. The design and implementation of microdrivers , 2008, ASPLOS.
[20] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[21] Robert N. M. Watson,et al. Capsicum: Practical Capabilities for UNIX , 2010, USENIX Security Symposium.
[22] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[23] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[24] Muli Ben-Yehuda,et al. The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.
[25] Neha Narula,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, IEEE Symposium on Security and Privacy.
[26] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[27] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[28] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[29] Adam Lackorzynski,et al. Virtual machines jailed: virtualization in systems with small trusted computing bases , 2009, VDTS '09.
[30] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.
[31] Stephen McCamant,et al. Evaluating SFI for a CISC Architecture , 2006, USENIX Security Symposium.
[32] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.