Protecting cloud virtual machines from hypervisor and host operating system exploits

SW Li, JS Koh, J Nieh - 28th USENIX Security Symposium (USENIX …, 2019 - usenix.org
Hypervisors are widely deployed by cloud computing providers to support virtual machines,
but their growing complexity poses a security risk as large codebases contain many …

Comprehensive VM protection against untrusted hypervisor through retrofitted AMD memory encryption

Y Wu, Y Liu, R Liu, H Chen, B Zang… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The confidentiality of tenant's data is confronted with high risk when facing hardware attacks
and privileged malicious software. Hardware-based memory encryption is one of the …

SofTEE: Software-based trusted execution environment for user applications

U Lee, C Park - IEEE access, 2020 - ieeexplore.ieee.org
Commodity operating systems are considered vulnerable. Therefore, when an application
handles security-sensitive data, it is highly recommended to run the application in a trusted …

Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust

Y Ma, C Yu, C Weng - Computers & Security, 2024 - Elsevier
Hypervisor, the core software in cloud computing, is susceptible to malicious intrusions,
potentially jeopardizing overall platform security. Physical hosts within the cloud computing …

HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation

K Lin, W Liu, K Zhang, B Tu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The HostOS or Hypervisor constitutes the most important cornerstone of today's commercial
cloud environment security. Unfortunately, the HostOS/Hypervisor, especially the QEMU …

SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting

MA Chauhan, MA Babar, F Rabhi - arXiv preprint arXiv:2408.12904, 2024 - arxiv.org
A Software Reference Architecture (SRA) is a useful tool for standardising existing
architectures in a specific domain and facilitating concrete architecture design, development …

Secure VM management with strong user binding in semi-trusted clouds

K Inokuchi, K Kourai - Journal of Cloud Computing, 2020 - Springer
Abstract In Infrastructure-as-a-Service (IaaS) clouds, remote users access provided virtual
machines (VMs) via the management server. The management server is managed by cloud …

Mitigation of kernel memory corruption using multiple kernel memory mechanism

H Kuzuno, T Yamauchi - IEEE Access, 2021 - ieeexplore.ieee.org
Operating systems adopt kernel protection methods (eg, mandatory access control, kernel
address space layout randomization, control flow integrity, and kernel page table isolation) …

An insight into decisive factors in cloud provider selection with a focus on security

S Pape, J Stankovic - … , SECPRE, SPOSE, and ADIoT, Luxembourg City …, 2020 - Springer
In the last ten years cloud computing has developed from a buzz word to the new computing
paradigm on a global scale. Computing power or storage capacity can be bought and …

Hardening hypervisors against vulnerabilities in instruction emulators

K Ishiguro, K Kono - Proceedings of the 11th European workshop on …, 2018 - dl.acm.org
Vulnerabilities in hypervisors are crucial in multi-tenant clouds and attractive for attackers
because a vulnerability in the hypervisor can undermine all the virtual machine (VM) …