A VMM Security Kernel for the VAX Architecture

نویسندگان

  • Paul A. Karger
  • Mary Ellen Zurko
  • Douglas W. Bonin
  • Andrew H. Mason
  • Clifford E. Kahn
چکیده

This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system’s hardware, microcode, and soft ware are aimed at meeting Allevcl security requirernents while maintaining the standard interfaces and applications of the VMS and ULTRIX–32 operating systems. The VAX security kernel supports multiple concurrent virtual machines on a single VAX system, providing isolation and controlled sharing of sensitive data. Rigorous engineering standards were applied during development to comply with the assurance requirements for verification and crmfigurat ion management. The VAX security kernel has been developed with a heavy emphasis on performance and on system management tools. The kernel performs sufficiently well that all of its development is now carried out in virtual machines running on the kernel itself, rather than in a conventional time-sharing system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Retrospective on the VAX VMM Security Kernel

This paper describes the development of a virtualmachine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system’s hardware, microcode, and software are aimed at meeting Al-level security requirements while maintaining the standard interfaces and applications of the VMS and ULTRIX-32 operating systems. The VAX Security Kernel supports multiple co...

متن کامل

Secure Hypervisors

Nowadays, more and more companies tend to use virtual machines instead of physically separated machines as platform for their IT services. This reduces the hardware costs and also simplifies the management of the IT infrastructure. However, virtualized environments do, in contrast to popular belief, not necessarily increase the security of a system. Actually, virtualized environments face the s...

متن کامل

Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor

A virtual machine monitor (VMM) allows multiple operating systems to run concurrently on virtual machines (VMs) on a single hardware platform. Each VM can be treated as an independent operating system platform. A secure VMM would enforce an overarching security policy on its VMs. The potential benefits of a secure VMM for PCs include: a more secure environment, familiar COTS operating systems a...

متن کامل

Secure and Fast Log Transfer Mechanism for Virtual Machine

Ensuring the integrity of logs is essential to reliably detect and counteract attacks because adversaries tamper with logs to hide their activities on a computer. Even though some studies proposed various protections of log files, adversaries can tamper with logs in kernel space with kernel-level malicious software (malware) because file access and inter-process communication are provided by an...

متن کامل

CS262A Midterm Solutions

[Yahel Ben-David:] I’ll presume the hardware used is the easier case of MIPS. The x86 architecture complicates things as some instructions may silently fail if not run under a real “ring-0” privileges. Before delving into the flow of control for handling a system-call (syscall) on a virtualized system, let’s briefly discuss what happens in a traditional setting (without virtualization): When th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990