VM-based Security Overkill: A Lament for Applied Systems Security Research

被引:0
|
作者
Bratus, Sergey [1 ]
Locasto, Michael E. [2 ]
Ramaswamy, Ashwin [1 ]
Smith, Sean W. [1 ]
机构
[1] Dartmouth Coll, Hanover, NH 03755 USA
[2] Univ Calgary, Calgary, AB T2N 1N4, Canada
关键词
virtualization; isolation; VM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization has seen a rebirth for a wide variety of uses; in our field, systems security researchers routinely use it as a standard tool for providing isolation and introspection. Researchers' use of virtual machines has reached a level of orthodoxy that makes it difficult for the collective wisdom to consider alternative approaches to protecting computation. We suggest that many scenarios exist where virtual machines do not provide a suitable tool or appropriate security properties. We analyze the use of virtual machines in the systems security space and we highlight other work that questions the current (ab) uses of virtualization. The takeaway message of this paper is that "self-protection" mechanisms still represent an interesting and viable path of research. At some point, hypervisors (or whatever the lowest layer of software, firmware, or programmable hardware is) must rely on detection and protection mechanisms embedded within themselves.
引用
收藏
页码:51 / 60
页数:10
相关论文
共 50 条
  • [21] Deep Reinforcement Learning-Based VM Migration for IoT Security
    Sahoo, Jagruti
    SOUTHEASTCON 2024, 2024, : 171 - 176
  • [22] Security marketing - Developing needs-based security systems
    Niederhauser, K
    KRIMINALISTIK, 1999, 53 (05): : 341 - 344
  • [23] Protocol engineering applied to formal analysis of security systems
    Lopez, J
    Ortega, JJ
    Troya, JM
    INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 246 - 259
  • [24] Optimized design and research of the intelligent residential security systems based on Lonworks
    Department of Architecture Engineering, Engineering University of Armed Police Force, Xi'an710086, China
    J. Convergence Inf. Technol., 2012, 8 (9-18):
  • [25] The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities
    Liu, Qin
    Liu, Yunlian
    Luo, Min
    He, Debiao
    Wang, Huaqun
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5741 - 5752
  • [26] Research on Security Facilities for Mountainous Countryside Based on the Characteristics of Security Needs
    Wei, LianYu
    Jiang, KaiZhen
    Ma, ShiBin
    Zheng, YanJun
    PROGRESS IN STRUCTURE, PTS 1-4, 2012, 166-169 : 2757 - +
  • [27] PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection
    Zhang, Fengzhe
    Huang, Yijian
    Wang, Huihong
    Chen, Haibo
    Zang, Binyu
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 9 - 18
  • [28] Optimizing Information Systems Security Design Based on Existing Security Knowledge
    Schilling, Andreas
    Werners, Brigitte
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 : 447 - 458
  • [29] RESEARCH DIRECTIONS IN INFORMATION-SYSTEMS SECURITY
    BASKERVILLE, R
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 1994, 14 (05) : 385 - 387
  • [30] Practical security region based security cost allocation of power systems
    Key Laboratory of Power System Simulation and Control, Ministry of Education, Tianjin University, Tianjin 300072, China
    Zhongguo Dianji Gongcheng Xuebao, 2009, 19 (1-7):