This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds
November/December 2010 (vol. 8 no. 6)
pp. 56-62
Qian Liu, Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Chuliang Weng, Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Minglu Li, Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Yuan Luo, Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Cloud computing relies heavily on virtualization. Virtualization technology has developed rapidly because of the rapid decrease in hardware cost and concurrent increase in hardware computing power. A virtual machine monitor (VMM, also called a hγpervisor) between the hardware and the OS enables multiple virtual machines (VMs) to run on top of a single physical machine. The VMM manages scheduling and dispatching the physical resources to the individual VMs as needed, and the VMs appear to users as separate computers. Widely used virtualization technologies include VMWare, Xen, Denali, and the Kernel-Based Virtual Machine (KVM). In this framework, a module measures executables running in virtual machines (VMs) and transfers the values to a trusted VM. Comparing those values to a reference table containing the trusted measurement values of running executables verifies the executable/s status.

1. J. Sugerman, G. Venkitachalam, and B. Lim, "Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor," Proc. Usenix Ann. Tech. Conf., Usenix Assoc., 2001, pp. 1–14.
2. P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles, ACM Press, 2003, p. 177.
3. A. Whitaker, M. Shaw, and S. Gribble, "Denali: Lightweight Virtual Machines for Distributed and Networked Applications," Proc. Usenix Ann. Tech. Conf., Usenix Assoc., 2002; http://denali.cs.washington.edu/pubs/distpubs/ papersdenali_usenix2002.pdf.
4. B. Payne et al., "Lares: An Architecture for Secure Active Monitoring Using Virtualization," Proc. IEEE Symp. Security and Privacy, IEEE Press, 2008, pp. 233–247.
5. R. Sailer et al., "Design and Implementation of a TCG-Based Integrity Measurement Architecture," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, p. 16.
6. M. Sharif et al., "Secure In-VM Monitoring Using Hardware Virtualization," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 477–487.
7. TPM Main Specification, Part 1: Design Principles, ver. 1.2, Trusted Computing Group, 2003.
8. J. Singh, W. Weber, and A. Gupta, "Splash: Stanford Parallel Applications for Shared-Memory," ACM SIGARCH Computer Architecture News, vol. 20, no. 1, 1992, pp. 5–44.
1. R. Sailer et al., "Design and Implementation of a TCG-Based Integrity Measurement Architecture," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, p. 16.
2. Z. Wang et al., "Countering Kernel Rootkits with Lightweight Hook Protection," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 545–554.
3. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection Based Architecture for Intrusion Detection," Proc. Network and Distributed Systems Security Symp. (NDSS 03), Internet Soc., 2003, pp. 253–285; http://suif.stanford.edu/papersvmi-ndss03.pdf .
4. A. Seshadri et al., "SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes," ACM SIGOPS Operating Systems Rev., vol. 41, no. 6, 2007, p. 350.
5. J. Levine, J. Grizzard, and H. Owen, "Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection," IEEE Security & Privacy, vol. 4, no. 1, 2006, pp. 24–32.
6. B. Payne et al., "Lares: An Architecture for Secure Active Monitoring Using Virtualization," Proc. IEEE Symp. Security and Privacy, IEEE Press, 2008, pp. 233–247.
7. M. Sharif et al., "Secure In-VM Monitoring Using Hardware Virtualization," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 477–487.

Index Terms:
virtual machines,Internet,operating system kernels,security of data,kernel-based virtual machine,In-VM measuring framework,virtual machine security,cloud computing,virtualization technology,virtual machine monitor,hγpervisor,VMWare,Xen,Denali,Cloud computing,Monitoring,Hardware,Prototypes,Virtual machine monitors,security and privacy,In-VM measuring,virtual machines,verification,Trusted Platform Module,TPM,Xen
Citation:
Qian Liu, Chuliang Weng, Minglu Li, Yuan Luo, "An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds," IEEE Security & Privacy, vol. 8, no. 6, pp. 56-62, Nov.-Dec. 2010, doi:10.1109/MSP.2010.143
Usage of this product signifies your acceptance of the Terms of Use.