Building a mac-based security architecture for the Xen open-source hypervisor
Download 220.31 Kb. Pdf ko'rish
|
Building a MAC based security architecture for the Xen open source
7 Conclusion
We presented a secure hypervisor architecture, sHype, that we have successfully implemented in the Xen open- source hypervisor. It can be downloaded as part of the Xen distribution [35]. We showed how access control in the hy- pervisor can be implemented in a way that has very low impact on VM performance and is non-intrusive to existing VMM code. The hypervisor layer is becoming a standard component in system software. With its coarse-grained resource man- agement, protection against workloads, and relatively small footprint, a hypervisor proved the ideal vehicle for imple- menting a flexible security framework that supports a range of security policies. Currently, we are extending our security architecture to cover multiple hardware platforms – involving policy agree- ments and the protection of information flows that leave the control of the local hypervisor. We need to establish trust into the semantics and enforcement of the security policy governing the remote hypervisor system before allowing in- formation flow to and from such a system. To this end, we are experimenting with establishing this trust based on the Trusted Computing Group’s Trusted Platform Module [1] and the related Integrity Measurement Architecture [28]. While Xen separates device drivers and management functions from Dom0 into their own domains, we are exper- imenting with MAC domains for sharing limited physical resources, e.g., in the mid-range server and desktop space. Future work includes the accurate accounting of resource use, and generating audit trails appropriate for medium- assurance Common Criteria evaluation targets. 9 Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005) 1063-9527/05 $20.00 © 2005 IEEE Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 06,2023 at 09:07:42 UTC from IEEE Xplore. Restrictions apply. |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling