We present a solution for preventing guests in a virtualized system from using direct memory access (DMA) to access memory regions of other guests. The principles we suggest, and that we also have implemented, are purely based on software and standard hardware. No additional virtualization hardware such as an I/O Memory Management Unit (IOMMU) is needed. Instead, the protection of the DMA controller is realized with means of a common ARM MMU only. Overhead occurs only in pre- and postprocessing of DMA transfers and is limited to a few microseconds. The solution was designed with focus on security and the abstract concept of the approach was formally verified.TNG SecurityPROSPE
Abstract A single address space operating system is an excellent environment for the im-plementation...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Virtualization has become a target for attacks in cloud computing environments. Existing approaches ...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Direct Memory Access (DMA) is frequently used to transfer data between the main memory of a host com...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
Every computer having a network, USB or disk controller has a Direct Memory Access Controller (DMAC)...
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access an...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Virtualization as a technology has existed for almost three decades now. By emulating physical resou...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Abstract A single address space operating system is an excellent environment for the im-plementation...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Virtualization has become a target for attacks in cloud computing environments. Existing approaches ...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Direct Memory Access (DMA) is frequently used to transfer data between the main memory of a host com...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
Every computer having a network, USB or disk controller has a Direct Memory Access Controller (DMAC)...
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access an...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Virtualization as a technology has existed for almost three decades now. By emulating physical resou...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Abstract A single address space operating system is an excellent environment for the im-plementation...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Virtualization has become a target for attacks in cloud computing environments. Existing approaches ...