An approach to on the fly activation and deactivation of virtualization-based security systems.
Authors
Abstract
We report on work in progress which allows on the fly activation and deactivation of hardware virtualization based security systems intended for protecting applications running under the control of untrusted operating system. We present an approach for reserving hardware resources from the operating system for the hypervisor and additional virtual machines that may be required by the security system. We also consider that hypervisor is launched from the untrusted environment that may try to fool the user during the startup and shutdown of the hypervisor.
Full text of the paper in pdfKeywords
Edition
Proceedings of Spring/Summer Young Researchers' Colloquium on Software Engineering, Nizhniy Novgorod, 2010, pp. 157-161.
DOI: 10.15514/SYRCOSE-2010-4-31
ISBN 978-5-91474-015-0
Research Group
All publications during 2010
