Enabling secure VM-vTPM migration in private clouds
暂无分享,去创建一个
Ghassan O. Karame | Srdjan Capkun | Ghassan Karame | Ramya Jayaram Masti | Boris Danev | Srdjan Capkun | Boris Danev
[1] Umesh Deshpande,et al. Post-copy live migration of virtual machines , 2009, OPSR.
[2] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[3] Jiang Wang,et al. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor , 2013 .
[4] Claudia Eckert,et al. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[5] Radia J. Perlman,et al. File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[8] Claire Vishik,et al. TPM Virtualization: Building a General Framework , 2008 .
[9] Heiko Stamer,et al. A Software-Based Trusted Platform Module Emulator , 2008, TRUST.
[10] Ahmad-Reza Sadeghi,et al. Beyond secure channels , 2007, STC '07.
[11] Paul England,et al. Para-Virtualized TPM Sharing , 2008, TRUST.
[12] Ahmad-Reza Sadeghi,et al. Property-Based TPM Virtualization , 2008, ISC.
[13] Radia Perlman,et al. The ephemerizer: making data disappear , 2005 .
[14] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[15] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[16] Anja Feldmann,et al. Live wide-area migration of virtual machines including local persistent state , 2007, VEE '07.
[17] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[18] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[19] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[20] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.