vCerberus: A DRTM system based on virtualization technology
- 52 Downloads
This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains. vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolated circumstance from the virtual domain, and can be attested by a remote party in an efficient way. These properties will be guaranteed even if the guest operating system is malicious. This protects the secure sensitive codes against the malicious codes in the Guest OS, e.g., the kernel rootkits. We present an approach to dynamically measure and isolate the launch environment on the virtual machines based on the para-virtualization technology and a novel virtualization of trusted platform module (TPM). Our performance experiment result shows that the overhead introduced by vCerberus is minimized; the performance of the launch environment in vCerberus is as competitive as the guest OS running on mainstream hypervisors.
Key wordstrusted computing para-virtualization dynamic root of trust for measurement (DRTM) trusted platform module (TPM)
CLC numberTP 309
Unable to display preview. Download preview PDF.
- Seshadri A, Luk M, Qu N, et al. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes[C]// Proc 21st ACM Symposium on Operating Systems Principles (SOSP’07). Stevenson: Association for Computing Machinery, 2007: 335–350.Google Scholar
- Laadan O, Baratto R A, Phung D B. et al. DejaView: A personal virtual computer recorder[C]//Proc 21st ACM Symposium on Operating Systems Principles (SOSP’07). Stevenson: Association for Computing Machinery, 2007: 279–292.Google Scholar
- Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03). Lake George: Association for Computing Machinery, 2003: 164–177.Google Scholar
- Trusted Computing Group. TCG architecture overview, Version 1.4 [EB/OL]. [2009-06-15]. http://www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14.
- Trusted Computing Group. TCG design, implementation, and usage principles (best practices)[EB/OL]. [2008-06-15]. http://www.trustedcomputinggroup.org/resources/tcg_design_implementation_and_usage_principles_best_practices.
- Intel Corp. Trusted execution technology architectural overview [EB/OL]. [2008-07-23]. http://www.intel.com/technology/security/down/oads/arch-overview.pdf.
- Intel Corp. Trusted execution technology overview [EB/OL]. [2009-07-23]. http://www.intel.com/technology/security/downloads/TrustedExec_Overview.pdf.
- AMD Corp. AMD64 architecture programmer’s manual, Volume 2: system programming[EB/OL]. [2009-07-23]. http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/24593.pdf.
- McCune J M, Parno B J, Perrig A, et al. Flicker: an execution infrastructure for TCB minimization[C]//Proc 3rd ACM European Conference on Computer Systems—EuroSys’08. Glasgow: Association for Computing Machinery, 2008: 315–328.Google Scholar
- Intel Corp. Intel® 64 and IA-32 architectures software developer’s manual volume 3B: system programming guide [EB/OL]. [2009-07-23]. http://www.intel.com/Assets/PDF/manual/253669.pdf.
- Swift M M, Bershad B N, Levy H M. Improving the reliability of commodity operating systems[C]// Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03). Lake George: Association for Computing Machinery, 2003: 207–222.Google Scholar
- Challener D. A Practical Guide to Trusted Computing[M]. Upper Saddle River: IBM Press/Pearson plc, 2008.Google Scholar
- Mayer U F. nbench 2.2.2[EB/OL]. [2009-08-10]. http://www.tux.org/~mayer/linux/bmark.html.