<p>Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors execute at a very high privilege level, they must be secure. A fundamental security property of a hypervisor is memory integrity – the hypervisor’s memory must not be modified by software running at a lower privilege level. In this paper, we present a methodology – called DRIVE – for designing, developing, and verifying hypervisors to ensure memory integrity. DRIVE combines the power of architectural constraints (captured by a set of system properties and verification conditions) with that of formal analysis (used to discharge the verification conditions). We prove that any hypervisor satisfying the DRIVE properties and verification conditions...
SecVisor is a hypervisor designed to guarantee that only code approved by the user of a system execu...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
AbstractThe paper discusses the constructive framework for writing hypervisor on the top of the VM. ...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achie...
Abstract. From 2007 to 2010, researchers from Microsoft and the Verisoft XT project verified code fr...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
This thesis presents the design of a secured, software based hypervisor for certification purposes. ...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
SecVisor is a hypervisor designed to guarantee that only code approved by the user of a system execu...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
AbstractThe paper discusses the constructive framework for writing hypervisor on the top of the VM. ...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achie...
Abstract. From 2007 to 2010, researchers from Microsoft and the Verisoft XT project verified code fr...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
This thesis presents the design of a secured, software based hypervisor for certification purposes. ...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
SecVisor is a hypervisor designed to guarantee that only code approved by the user of a system execu...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
The business world is exhibiting a growing dependency on computer systems, their operations and th...