Pék et al., 2013 - Google Patents
A survey of security issues in hardware virtualizationPék et al., 2013
View PDF- Document ID
- 2708170157104097796
- Author
- Pék G
- Buttyán L
- Bencsáth B
- Publication year
- Publication venue
- ACM Computing Surveys (CSUR)
External Links
Snippet
Virtualization is a powerful technology for increasing the efficiency of computing services; however, besides its advantages, it also raises a number of security issues. In this article, we provide a thorough survey of those security issues in hardware virtualization. We focus on …
- 238000005516 engineering process 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7271—Fault verification, e.g. comparing two values which should be the same, unless a computational fault occurred
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pék et al. | A survey of security issues in hardware virtualization | |
| Subramanian et al. | Recent security challenges in cloud computing | |
| Coppolino et al. | Cloud security: Emerging threats and current solutions | |
| Pearce et al. | Virtualization: Issues, security threats, and solutions | |
| Scarfone | Guide to security for full virtualization technologies | |
| Aiash et al. | Secure live virtual machines migration: issues and solutions | |
| Li et al. | Mycloud: supporting user-configured privacy protection in cloud computing | |
| Vaughan-Nichols | Virtualization sparks security concerns | |
| Roy et al. | Secure the cloud: From the perspective of a service-oriented organization | |
| CN112433822A (en) | Method for realizing cross-domain network terminal virtual machine based on separation of three rights | |
| Laniepce et al. | Engineering intrusion prevention services for iaas clouds: The way of the hypervisor | |
| Deshane | An attack-resistant and rapid recovery desktop system | |
| Price | The paradox of security in virtual environments | |
| Abed et al. | Resilient intrusion detection system for cloud containers | |
| Chandramouli | Security recommendations for hypervisor deployment on servers | |
| Kazim et al. | Virtualization security in cloud computing | |
| Yao et al. | CryptVMI: A flexible and encrypted virtual machine introspection system in the cloud | |
| Upadhyay et al. | Secure live migration of VM's in Cloud Computing: A survey | |
| Verma et al. | Next‐Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization Security: The Present State and Future | |
| Chandramouli | Security recommendations for server-based hypervisor platforms | |
| Sethi et al. | Trusted-Cloud: A cloud security model for Infrastructure as a Service (IaaS) | |
| Win et al. | Handling the hypervisor hijacking attacks on virtual cloud environment | |
| England et al. | Virtual machines for enterprise desktop security | |
| Mansukhani et al. | The Security Challenges and Countermeasures of Virtual Cloud | |
| Jin et al. | Vmfence: a customized intrusion prevention system in distributed virtual computing environment |