• DocumentCode
    568454
  • Title

    HyperDomain: Enabling Inspection of Malicious VMM´s Misbehavior

  • Author

    Yang, Wenyin ; Ma, Li

  • Author_Institution
    Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
  • fYear
    2012
  • fDate
    25-27 June 2012
  • Firstpage
    588
  • Lastpage
    595
  • Abstract
    Virtualization enables the popularization of cloud computing on the one hand, and naturally becomes the security base of cloud computing on the other hand. Nowadays, most of the existing researches focus on the security protection of Virtual Machine (VM) which is ensured by the Virtual Machine Monitor (VMM) provided by Cloud Service Provider. Nevertheless, it´s easily neglected that the VMM is a potential malware, which may threaten the confidentiality of VM´s data without users´ awareness. In this paper, we present HyperDomain, a framework implemented with hardware components and a security VM, aiming to guarantee the confidentiality of data on the memory through verification and measurement of VMM´s related operations. Besides, in order to ensure the normal operation of HyperDomain, self-protection mechanisms, including secret communication scheme and capability enhancement of security VM, are introduced. The security analysis shows that the inspection of VMM´s misbehavior is effective to defend against the attacks to memory data, and to inform the guest VMs about the illegal operation. In addition, the auxiliary HyperDomain self-protection approaches are proved to be valid for eavesdropping and interruption attacks defense.
  • Keywords
    cloud computing; formal verification; invasive software; software metrics; virtual machines; virtualisation; HyperDomain; VM data confidentiality; cloud computing; cloud service provider; eavesdropping attacks defense; interruption attacks defense; malicious VMM Misbehavior inspection; malware; secret communication scheme; security VM capability enhancement; security base; security protection; self-protection mechanisms; virtual machine monitor; virtualization; Cloud computing; Computer architecture; Hardware; Security; Support vector machines; Virtual machine monitors; cloud computing; data confidentiality; security; virtual machine monitor; virtualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
  • Conference_Location
    Liverpool
  • Print_ISBN
    978-1-4673-2172-3
  • Type

    conf

  • DOI
    10.1109/TrustCom.2012.178
  • Filename
    6296024