DocumentCode :
3274395
Title :
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution
Author :
Wen, Yan ; Zhao, Jinjing ; Zhao, Gang ; Chen, Hua ; Wang, Dongxia
Author_Institution :
Beijing Inst. of Syst. Eng., Beijing, China
fYear :
2012
fDate :
4-6 July 2012
Firstpage :
378
Lastpage :
383
Abstract :
In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hyper visor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.
Keywords :
Internet; security of data; system monitoring; virtual machines; Internet; PC platform; computer system privilege; continually advancing threat; hyper visor; isolated execution environment; potential security issues; software layer; transparency portability; untrusted code execution; virtual machine monitor; virtualization technology; Computers; Hardware; Linux; Security; Software; Virtual machining; Untrusted code execution; virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on
Conference_Location :
Palermo
Print_ISBN :
978-1-4673-1328-5
Type :
conf
DOI :
10.1109/IMIS.2012.92
Filename :
6296882
Link To Document :
بازگشت