DocumentCode :
568454
Title :
HyperDomain: Enabling Inspection of Malicious VMM´s Misbehavior
Author :
Yang, Wenyin ; Ma, Li
Author_Institution :
Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
588
Lastpage :
595
Abstract :
Virtualization enables the popularization of cloud computing on the one hand, and naturally becomes the security base of cloud computing on the other hand. Nowadays, most of the existing researches focus on the security protection of Virtual Machine (VM) which is ensured by the Virtual Machine Monitor (VMM) provided by Cloud Service Provider. Nevertheless, it´s easily neglected that the VMM is a potential malware, which may threaten the confidentiality of VM´s data without users´ awareness. In this paper, we present HyperDomain, a framework implemented with hardware components and a security VM, aiming to guarantee the confidentiality of data on the memory through verification and measurement of VMM´s related operations. Besides, in order to ensure the normal operation of HyperDomain, self-protection mechanisms, including secret communication scheme and capability enhancement of security VM, are introduced. The security analysis shows that the inspection of VMM´s misbehavior is effective to defend against the attacks to memory data, and to inform the guest VMs about the illegal operation. In addition, the auxiliary HyperDomain self-protection approaches are proved to be valid for eavesdropping and interruption attacks defense.
Keywords :
cloud computing; formal verification; invasive software; software metrics; virtual machines; virtualisation; HyperDomain; VM data confidentiality; cloud computing; cloud service provider; eavesdropping attacks defense; interruption attacks defense; malicious VMM Misbehavior inspection; malware; secret communication scheme; security VM capability enhancement; security base; security protection; self-protection mechanisms; virtual machine monitor; virtualization; Cloud computing; Computer architecture; Hardware; Security; Support vector machines; Virtual machine monitors; cloud computing; data confidentiality; security; virtual machine monitor; virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.178
Filename :
6296024
Link To Document :
بازگشت