Security Protocols 2010: Security Protocols XVIII pp 252-265 | Cite as

Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion)

  • Virgil Gligor
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7061)

Abstract

Many of the ideas I will present were developed in collaboration with Jonathan McCune, Bryan Parno, Adrian Perrig, Amit Vasudevan and Zongwei Zhou over the past couple of years. I will begin the presentation with my “axioms” of insecurity and usable security. These axioms are in fact observations that I believe will be true in the future. Then I will review virtualization for security and experiences that we have had with it practically since day one. I will also review the limitations of virtual-machine isolation for application-level code and usable security. And finally, the main proposition of this presentation is that we should switch our attention from virtualization and virtual-machine isolation, to redgreen machine partitions, which is somewhat of a new area, and to trustworthy communication. I will argue that trustworthy communication requires more than secure-channel protocols.

Keywords

Virtual Machine Security Breach Green Module Virtual Machine Monitor Security Limitation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Virgil Gligor
    • 1
  1. 1.Carnegie Mellon UniversityUSA

Personalised recommendations