Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computing base (TCB) enhancing the security of existing operating systems. The complexity of a VMM-based TCB causes the high risk of security vulnerabilities. Therefore, this paper proposesa two-step execution mechanism to reduce the complexityof a VMM-based TCB. We propose a method to separate aconventional VMM-based TCB into the following two parts:(1) A thin hypervisor with security services and (2) A special guest OS for security preprocessing. A special guestOS performing security tasks can be executed in advance.After shutting down the special guest OS, a hypervisor obtains preprocessing security data and next boots a targetguest OS to be prote...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
Part 9: Cloud ComputingInternational audienceIn cloud computing, the security of infrastructure is d...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Recent years have witnessed increased adoption of hosted hypervisors in virtualized computer systems...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
An important security challenge is to protect the execution of security-sensitive code on legacy sys...
We develop a special-purpose hypervisor called TrustVisor that facilitates the execution of security...
Part 3: System SecurityInternational audienceThe sustained popularity of the cloud and cloud-related...
cs.kuleuven.be Abstract The sustained popularity of the cloud and cloud-related services accelerate ...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
Part 9: Cloud ComputingInternational audienceIn cloud computing, the security of infrastructure is d...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Recent years have witnessed increased adoption of hosted hypervisors in virtualized computer systems...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
An important security challenge is to protect the execution of security-sensitive code on legacy sys...
We develop a special-purpose hypervisor called TrustVisor that facilitates the execution of security...
Part 3: System SecurityInternational audienceThe sustained popularity of the cloud and cloud-related...
cs.kuleuven.be Abstract The sustained popularity of the cloud and cloud-related services accelerate ...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...