Virtualization: Issues, Security Threats, and Solutions

被引:98
作者
Pearce, Michael [1 ]
Zeadally, Sherali [2 ]
Hunt, Ray [1 ]
机构
[1] Univ Canterbury, Dept Comp Sci & Software Engn, Christchurch 1, New Zealand
[2] Univ Dist Columbia, Dept Comp Sci & Informat Technol, Washington, DC 20008 USA
关键词
Design; Security; Reliability; Performance; Encryption; virtualization; threat; virtual machine; virtual machine monitor; MACHINE MONITORS; HARDWARE; REQUIREMENTS; SOFTWARE; MALWARE; DESIGN;
D O I
10.1145/2431211.2431216
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the rapid deployment of commodity hardware and software systems. In principle, virtualization involves the use of an encapsulating software layer (Hypervisor or Virtual Machine Monitor) which surrounds or underlies an operating system and provides the same inputs, outputs, and behavior that would be expected from an actual physical device. This abstraction means that an ideal Virtual Machine Monitor provides an environment to the software equivalent to the host system, but which is decoupled from the hardware state. Because a virtual machine is not dependent on the state of the physical hardware, multiple virtual machines may be installed on a single set of hardware. The decoupling of physical and logical states gives virtualization inherent security benefits. However, the design, implementation, and deployment of virtualization technology have also opened up novel threats and security issues which, while not particular to system virtualization, take on new forms in relation to it. Reverse engineering becomes easier due to introspection capabilities, as encryption keys, security algorithms, low-level protection, intrusion detection, or antidebugging measures can become more easily compromised. Furthermore, associated technologies such as virtual routing and networking can create challenging issues for security, intrusion control, and associated forensic processes. We explain the security considerations and some associated methodologies by which security breaches can occur, and offer recommendations for how virtualized environments can best be protected. Finally, we offer a set of generalized recommendations that can be applied to achieve secure virtualized implementations.
引用
收藏
页数:39
相关论文
共 127 条
[1]   A comparison of software and hardware techniques for x86 virtualization [J].
Adams, Keith ;
Agesen, Ole .
ACM SIGPLAN NOTICES, 2006, 41 (11) :2-13
[2]  
ADVANCED MICRO DEVICES, 2010, AMD VIRT AMD V TECHN
[3]  
Advanced Micro Devices, 2008, AMD V NEST PAG
[4]  
Allen WH, 2007, IEEE SECUR PRIV, V5, P65, DOI 10.1109/MSP.2007.92
[5]  
[Anonymous], 2006, P 1 WORKSH ARCH SYST, DOI DOI 10.1145/1181309.1181311
[6]  
[Anonymous], 2008, Brussels, P1
[7]  
[Anonymous], COMPUTING SURVEYS
[8]  
[Anonymous], 2005, P 1 IEEE WORKSH HOT
[9]  
[Anonymous], 2005, ACM Transactions on Storage
[10]  
[Anonymous], 2003, ACM SIGOPS OPERATING