Security Implications of Different Virtualization Approaches for Secure Cyber Architectures

نویسندگان

  • Sanaz Rahimi
  • Mehdi Zargham
چکیده

Virtualization is increasingly being used as a component in designing secure cyber architectures. The proposed applications include strong isolation, monitoring, fault tolerance, execution replay, etc. However, there are various virtualization approaches which differ in their security implications, proper applications, overheads, requirements, and most importantly threat models. Firstly, virtualization solutions range from hardware assisted to completely software emulated. They can be further categorized by their abstraction level from hardware virtualization, to operating system level virtualization (containers), to application virtualization. Finally, they differ widely in the way they handle I/O; from having a separate I/O virtual machine (privileged partition) to hardware assisted I/O virtualization (IOMMU). In order to deploy the most effective virtualization approach when designing a secure cyber system, it is imperative to fully understand the benefits offered and the trade-offs involved in each method. In this work, we study the spectrum of virtualization modes and discuss their strengths, weaknesses, requirements, and threat models. For instance, lightweight paravirtualization with IOMMU can reduce the size of the trusted computing base (TCB) significantly which makes it a proper candidate for high assurance isolation and thin client applications. On the other hand, containers have the similar TCB size as a full blown operating system, but they preserve the semantic information lost in the lower level virtualizations which makes them suitable for replay and monitoring applications. Moreover, we identify several gaps combinations that have not been implemented yet, to the best of our knowledge which, if available, can be valuable for specific applications and assurance requirements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtualization Based Security Framework (vBASE)

In general, computer security aims at providing confidentiality, integrity and availability to computing systems. Traditionally, researchers in the fields of computer security have used software and hardware mechanisms for implementing security in computing systems. Software only security approaches typically deal with application level and Operating System (OS) level security mechanisms. Thoug...

متن کامل

Virtualization Based Secure Execution and Testing Framework

Computer security aims at protecting confidentiality, integrity, and availability of sensitive information that are processed, used, or stored by computing systems. Computer scientists working in the field of computer security have successfully designed and developed software and hardware mechanisms to provide security in modern day computing devices. As compared to hardware security mechanisms...

متن کامل

A Survey on Security Assurance Architecture in Virtualization implementation on Cloud

Cloud computing is a natural extension of virtualisation technologies that enable scalable management of virtual machines over a massive physically connected systems. The virtualisation-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasise the construction and deployment of scalable, energy-efficient network software applications (NetApp) by virtue of im...

متن کامل

Securing Cloud Environment

Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential to make computations of the virtual mac...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010