DocumentCode :
1705133
Title :
Defeating TCG TOCTOU Attacks in Trusted HVM
Author :
Xiaolin Chang ; Han Zhen ; Ji Qiang Liu ; Bin Xing ; Muppala, J.K.
Author_Institution :
Dept. of Comput. Eng., Beijing JiaoTong Univ., Beijing, China
fYear :
2010
Firstpage :
598
Lastpage :
602
Abstract :
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small number of efforts address the handling of the detected TCG TOCTOU attacks. This paper aims to defeat TCG TOCTOU attacks occurring in Xen hardware virtual machines. We propose an efficient response approach (ERA) in the environment of the Xen virtual machine monitor and the virtual TPM facility shipped with the Xen. ERA has the following features: (1) Effective in defeating the TCG TOCTOU attacks; (2) Impose less overhead on the system during normal execution; and (3) Transparent to guest virtual machines. We describe the ERA implementation in detail and evaluate its ability via experiments.
Keywords :
operating systems (computers); security of data; virtual machines; virtualisation; TCG TOCTOU attack detection; Xen hardware virtual machines; commodity PC operating systems; efficient response approach; time-of-check-time-of-use attacks; trusted HVM; virtualization technologies; Hardware; Kernel; Security; Sockets; Virtual machine monitors; Virtual machining; TOCTOU attacks; hardware virtual machines; kernel rootkit; trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2010 International Conference on
Conference_Location :
Nanjing, Jiangsu
Print_ISBN :
978-1-4244-8626-7
Electronic_ISBN :
978-0-7695-4258-4
Type :
conf
DOI :
10.1109/MINES.2010.131
Filename :
5671083
Link To Document :
بازگشت