Virtualization and hardware-based security

被引:18
作者
Perez, Ronald
Sailer, Reiner
van Doorn, Leendert
机构
[1] IBM T.J. Watson Research Center
[2] Advanced Micro Devices
关键词
D O I
10.1109/MSP.2008.135
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Hardware and software-based security are hypervisors or virtual machine monitor (VMM) technologies that are utilized in the context of modern computing environments and requirements. Hypervisors function as reference monitors, providing workload isolation on an operating system instance granularity. Hardware support, such as management of memory and other system and processor resources and contact switching between protection modes, is critical to maximize overall system performance. IBM includes a power processor duplicating a certain key registers in a new hypervisor state that operate independently from their supervisor-state counterparts. Intel's secure computing platform, Lagrande Technology, consisting of a VT core to provide process isolation and special keyboard and video capabilities, to provide sealed storage and platform attestation.
引用
收藏
页码:24 / 31
页数:8
相关论文
共 21 条
[1]  
*ADV MICR DEV, 2006, AMD I O VIRT TECHN I
[2]  
AMD, AMD64 Architecture Programmer's Manual, V2
[3]  
Anderson J. P, 1972, ESDTR7351, VI
[4]  
ANDERSON JP, 1972, ESDTR7351, V2
[5]   Advanced virtualization capabilities of POWER5 systems [J].
Armstrong, WJ ;
Arndt, RL ;
Boutcher, DC ;
Kovacs, RG ;
Larson, D ;
Lucke, KA ;
Nayar, N ;
Swanberg, RC .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2005, 49 (4-5) :523-532
[6]  
Barham P., 2003, Operating Systems Review, V37, P164, DOI 10.1145/1165389.945462
[7]  
Berger S., 2008, ACM SIGOPS OPERATING, V42, P40, DOI DOI 10.1145/1341312.1341321
[8]  
Berger S, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P305
[9]   THE ORIGIN OF THE VM-370 TIME-SHARING SYSTEM [J].
CREASY, RJ .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1981, 25 (05) :483-490
[10]   Building the IBM 4758 secure coprocessor [J].
Dyer, JG ;
Lindemann, M ;
Perez, R ;
Sailer, R ;
van Doorn, L ;
Smith, SW ;
Weingart, S .
COMPUTER, 2001, 34 (10) :57-+