VM-based Security Overkill: A Lament for Applied Systems Security Research

被引:0
|
作者
Bratus, Sergey [1 ]
Locasto, Michael E. [2 ]
Ramaswamy, Ashwin [1 ]
Smith, Sean W. [1 ]
机构
[1] Dartmouth Coll, Hanover, NH 03755 USA
[2] Univ Calgary, Calgary, AB T2N 1N4, Canada
关键词
virtualization; isolation; VM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization has seen a rebirth for a wide variety of uses; in our field, systems security researchers routinely use it as a standard tool for providing isolation and introspection. Researchers' use of virtual machines has reached a level of orthodoxy that makes it difficult for the collective wisdom to consider alternative approaches to protecting computation. We suggest that many scenarios exist where virtual machines do not provide a suitable tool or appropriate security properties. We analyze the use of virtual machines in the systems security space and we highlight other work that questions the current (ab) uses of virtualization. The takeaway message of this paper is that "self-protection" mechanisms still represent an interesting and viable path of research. At some point, hypervisors (or whatever the lowest layer of software, firmware, or programmable hardware is) must rely on detection and protection mechanisms embedded within themselves.
引用
收藏
页码:51 / 60
页数:10
相关论文
共 50 条
  • [1] Analysis of VM Communication for VM-based Cloud Security Systems
    Mthunzi, Siyakha N.
    Benkhelifa, Elhadj
    Alsmirat, Mohammad A.
    Jararweh, Yaser
    2018 FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2018, : 182 - 188
  • [2] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    1600, Institute of Electrical and Electronics Engineers Inc., United States
  • [3] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133
  • [4] Towards a Formally Verified Security Monitor for VM-based Confidential Computing
    Ozga, Wojciech
    Hunt, Guerney D. H.
    Le, Michael V.
    Palmer, Elaine R.
    Shinnar, Avraham
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 73 - 81
  • [5] Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds
    Estrada, Zachary J.
    Sprabery, Read
    Yan, Lok
    Yu, Zhongzhi
    Campbell, Roy
    Kalbarczyk, Zbigniew
    Iyer, Ravishankar K.
    ACM SIGPLAN NOTICES, 2017, 52 (07) : 157 - 170
  • [6] Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 156 - 163
  • [7] Survivability Analysis of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
  • [8] Performance Evaluation of VM-Based Intrusion Tolerant Systems with Poisson Arrivals
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 181 - 187
  • [9] Dynamic Power Scheduling for VM-based Multi-core Systems
    Liang, Jhe-Ming
    Zhan, Ren-Hao
    Chen, Wei-Mei
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [10] Research on security mechanism of power systems based on the security assessment model
    Han, Songming
    Xie, Ming
    Li, Xin
    Lu, Jieke
    Ming, Shaofeng
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 732 - 736