CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
暂无分享,去创建一个
Haibo Chen | Binyu Zang | Jin Chen | Fengzhe Zhang | Haibo Chen | B. Zang | Fengzhe Zhang | Jin Chen
[1] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[2] Robert P. Goldberg,et al. Survey of virtual machine research , 1974, Computer.
[3] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[4] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[5] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[6] Steve Vandebogart,et al. Make Least Privilege a Right (Not a Privilege) , 2005, HotOS.
[7] Haibo Chen,et al. Daonity - Grid security from two levels of virtualization , 2007, Inf. Secur. Tech. Rep..
[8] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[9] Zhao Yu,et al. SR-IOV Networking in Xen: Architecture, Design and Implementation , 2008, Workshop on I/O Virtualization.
[10] Brad Fitzpatrick,et al. Distributed caching with memcached , 2004 .
[11] Carl Staelin,et al. lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.
[12] George Varghese,et al. Difference engine , 2010, OSDI.
[13] Thomas Morris,et al. Trusted Platform Module , 2011, Encyclopedia of Cryptography and Security.
[14] Christoforos E. Kozyrakis,et al. Hardware Enforcement of Application Security Policies Using Tagged Memory , 2008, OSDI.
[15] Gil Neiger,et al. Intel ® Virtualization Technology for Directed I/O , 2006 .
[16] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] Steven Hand,et al. Satori: Enlightened Page Sharing , 2009, USENIX Annual Technical Conference.
[18] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[19] Shigeru Chiba,et al. BitVisor: a thin hypervisor for enforcing i/o device security , 2009, VEE '09.
[20] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[21] Paul England,et al. NGSCB: A Trusted Open System , 2004, ACISP.
[22] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[23] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] Calton Pu,et al. Reducing TCB complexity for security-sensitive applications: three case studies , 2006, EuroSys.
[25] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[26] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[27] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[28] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[29] Cheng Chen,et al. Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor , 2007 .
[30] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[31] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[32] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[33] Muli Ben-Yehuda,et al. The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.
[34] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[35] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[36] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[37] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[38] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[39] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[40] Carsten Weinhold. jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components , 2011, USENIX Annual Technical Conference.
[41] Haibo Chen,et al. Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[42] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[43] Kang G. Shin,et al. Using hypervisor to provide data secrecy for user applications on a per-page basis , 2008, VEE '08.
[44] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[45] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[46] James E. Smith,et al. The architecture of virtual machines , 2005, Computer.
[47] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[48] Gil Neiger,et al. IntelŴVirtualization Technology: Hardware Support for Efficient Processor Virtualization , 2006 .
[49] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[50] Jennifer Rexford,et al. NoHype: virtualized cloud infrastructure without the virtualization , 2010, ISCA.
[51] Chun-Kun,et al. Lecture Note Sel4: Formal Verification of an Os Kernel , 2022 .
[52] Michael K. Reiter,et al. Minimal TCB Code Execution , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).