Re-engineering Xen internals for higher-assurance security

被引:6
作者
Center for High Assurance Computer Systems, Naval Research Laboratory, United States [1 ]
机构
[1] Center for High Assurance Computer Systems, Naval Research Laboratory
来源
Inf Secur Tech Rep | 2008年 / 1卷 / 17-24期
关键词
16;
D O I
10.1016/j.istr.2008.01.001
中图分类号
学科分类号
摘要
The Xenon project is investigating the construction of a higher-assurance open source separation kernel based on the Xen open source hypervisor. Just as the Xen open source hypervisor was initially developed from the open source Linux operating system, by simplifying Linux and modifying its design, the Xenon separation kernel is being developed from Xen. The primary goal of the Xenon project is to investigate issues in creating an open source software product with higher security assurance than conventional open source software. The Xenon project is also focused on (1) problems relating to separation kernels that support unmodified uninterpreted commercial off the shelf (COTS) guests and (2) distinctions between these kinds of separation kernels and hypervisors. This paper explains the Xenon project's approach to re-engineering Xen's internal structure into a higher-assurance form. If conventional open source software cannot be brought into this form with moderate amounts of re-engineering then higher-assurance open source software is probably not practical. Our results indicate that moderate amounts of re-engineering will be sufficient for all but a small part of the code. The remaining code is small enough to be addressed in a reasonable time, even though more effort is required.
引用
收藏
页码:17 / 24
页数:7
相关论文
共 10 条
  • [1] Anderson R., Security engineering: a guide to building dependable distributed systems, (2001)
  • [2] Barham P., Dragovic B., Fraiser K., Hand S., Harris T., Ho A., Et al., Xen and the art of virtualization, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19), (2003)
  • [3] Brady R., Anderson R., Ball R., Murphy's law, the fitness of evolving species, and the limits of software reliability, (1999)
  • [4] Bishop P., Bloomfield R., A conservative theory for long-term reliability growth prediction, IEEE Transactions on Reliability, 45, 4, (1996)
  • [5] Clements P., Bachmann F., Bass L., Garlan D., Ivers J., Little R., Et al., Documenting software architectures: views and beyond, (2003)
  • [6] Halstead M., Elements of software science. Operating and programming systems series, (1977)
  • [7] Littlewood B., Predicting software reliability, Philosophical Transactions of the Royal Society of London, A327, pp. 513-527, (1989)
  • [8] McCabe T., A complexity measure, IEEE Transactions on Software Engineering, 2, 4, pp. 308-320, (1976)
  • [9] McDermott J., Kirby J., Kang M., Montrose B., Xenon formal security policy model, (2007)
  • [10] Parnas D., On the criteria to be used in decomposing systems into modules, CACM, 15, 12, (1972)