Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits
暂无分享,去创建一个
[1] Kang G. Shin,et al. Using hypervisor to provide data secrecy for user applications on a per-page basis , 2008, VEE '08.
[2] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Rusty Russell,et al. virtio: towards a de-facto standard for virtual I/O devices , 2008, OPSR.
[4] Jason Nieh,et al. KVM/ARM: Experiences Building the Linux ARM Hypervisor , 2013 .
[5] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[6] Brian Rogers,et al. SecureME: a hardware-software approach to full system security , 2011, ICS '11.
[7] Yue Chen,et al. Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems , 2015, IEEE Transactions on Dependable and Secure Computing.
[8] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[9] Miao Yu,et al. Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O , 2014, 2014 IEEE Symposium on Security and Privacy.
[10] Alec Wolman,et al. Delusional boot: securing hypervisors without massive re-engineering , 2012, EuroSys '12.
[11] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[12] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[13] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[14] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[15] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[17] Zhi Wang,et al. Isolating commodity hosted hypervisors with HyperLock , 2012, EuroSys '12.
[18] Emmett Witchel,et al. InkTag: secure applications on an untrusted operating system , 2013, ASPLOS '13.
[19] Will Dietz,et al. Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation , 2015, ASPLOS.
[20] Jason Nieh,et al. NEVE: Nested Virtualization Extensions for ARM , 2017, SOSP.
[21] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[22] Yutao Liu,et al. Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption , 2018, 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA).
[23] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[24] Abhinav Srivastava,et al. Self-service cloud computing , 2012, CCS '12.
[25] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[26] Jun Zhu,et al. Breaking up is hard to do: security and functionality in a commodity hypervisor , 2011, SOSP.
[27] Jason Nieh,et al. ARM Virtualization: Performance and Architectural Implications , 2016, ISCA.
[28] Mohan Kumar,et al. S-NFV: Securing NFV states by using SGX , 2016, SDN-NFV@CODASPY.
[29] Susan Landau,et al. Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.
[30] Jennifer Rexford,et al. NoHype: virtualized cloud infrastructure without the virtualization , 2010, ISCA.
[31] David Lie,et al. Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.
[32] Dan Meng,et al. HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM , 2017, VEE.
[33] Liang Deng,et al. Dancing with Wolves: Towards Practical Event-driven VMM Monitoring , 2017, VEE.
[34] Angelos D. Keromytis,et al. kGuard: Lightweight Kernel Protection against Return-to-User Attacks , 2012, USENIX Security Symposium.
[35] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[36] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[37] Jason Nieh,et al. Optimizing the Design and Implementation of the Linux ARM Hypervisor , 2017, USENIX Annual Technical Conference.
[38] Jason Nieh,et al. KVM/ARM: the design and implementation of the linux ARM hypervisor , 2014, ASPLOS.
[39] Yutao Liu,et al. Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation , 2015, CCS.
[40] Gernot Heiser,et al. The OKL4 microvisor: convergence point of microkernels and hypervisors , 2010, APSys '10.
[41] Shigeru Chiba,et al. BitVisor: a thin hypervisor for enforcing i/o device security , 2009, VEE '09.
[42] James Newsome,et al. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework , 2013, 2013 IEEE Symposium on Security and Privacy.
[43] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[44] Ruby B. Lee,et al. Architectural support for hypervisor-secure virtualization , 2012, ASPLOS XVII.
[45] Zhi Wang,et al. Taming Hosted Hypervisors with (Mostly) Deprivileged Execution , 2013, NDSS.
[46] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[47] Gorka Irazoqui Apecechea,et al. S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES , 2015, 2015 IEEE Symposium on Security and Privacy.
[48] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[49] Jaehyuk Huh,et al. Architectural support for secure virtualization under a vulnerable hypervisor , 2011, 2011 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[50] Yubin Xia,et al. Deconstructing Xen , 2017, NDSS.
[51] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[52] Patrick Stewin,et al. Understanding DMA Malware , 2012, DIMVA.
[53] Michael Backes,et al. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach , 2013, NDSS.
[54] Frank Piessens,et al. Fides: selectively hardening software application components against kernel-level or process-level malware , 2012, CCS '12.
[55] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.
[56] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[57] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[58] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[59] Yubin Xia,et al. vTZ: Virtualizing ARM TrustZone , 2017, USENIX Security Symposium.
[60] William J. Bolosky,et al. Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.
[61] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[62] Yutao Liu,et al. Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks , 2013, 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA).