High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems require strict limitation of the interactions between different security compartments based on a security policy. Virtualization can be used to provide a high degree of separation in such systems. This work provides a study of commercial-off-the-shelf (COTS) products to support high assurance MLS systems and designs a candidate architecture based on virtualization and trusted execution to provide strong compartmentalization. We then identify three major security problems in the candidate architecture: the lack of trust in the network, the problem of patch management, and untrusted graphics. We study and solve each of the security gaps in deta...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
As the complexity of current software systems increases, we see a correlative increase in the number...
High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems ...
Abstract—High assurance MILS and MLS systems require strict limitation of the interactions between d...
With commodity operating systems failing to establish unbreakable isolation of processes, there is a...
Research supported by ONR. As computer systems become distributed and heterogeneous, there is strong...
The Department of Defense and U.S. Government have an identified need to securely share information ...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
In view of some new security issues in the computing platform with virtualization technology, this p...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
As the complexity of current software systems increases, we see a correlative increase in the number...
High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems ...
Abstract—High assurance MILS and MLS systems require strict limitation of the interactions between d...
With commodity operating systems failing to establish unbreakable isolation of processes, there is a...
Research supported by ONR. As computer systems become distributed and heterogeneous, there is strong...
The Department of Defense and U.S. Government have an identified need to securely share information ...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
In view of some new security issues in the computing platform with virtualization technology, this p...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Abstract — A high assurance architecture is described for the protection of distributed multilevel s...
As the complexity of current software systems increases, we see a correlative increase in the number...