An exhaustive survey on security concerns and solutions at different components of virtualization

R Patil, C Modi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …

Locally-centralized certificate validation and its application in desktop virtualization systems

B Li, J Lin, Q Wang, Z Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To validate a certificate, a user needs to install the certificate of the root certification authority
(CA) and download the certificate revocation information (CRI). Although operating systems …

HA-VMSI: A lightweight virtual machine isolation approach with commodity hardware for ARM

M Zhu, B Tu, W Wei, D Meng - ACM SIGPLAN Notices, 2017 - dl.acm.org
Once compromising the hypervisor, remote or local adversaries can easily access other
customers' sensitive data in the memory and context of guest virtual machines (VMs). VM …

[PDF][PDF] 虚拟化软件栈安全研究

朱民, 涂碧波, 孟丹 - 计算机学报, 2017 - cjc.ict.ac.cn
摘要随着云计算的兴起, 虚拟化技术在IT 产业中得到了广泛应用. 政府, 企业和个人已将自身的
大量业务及其敏感数据转移到了云端的虚拟机中. 在虚拟化软件栈中, 虚拟机监控器具有最高 …

HyperMI: a privilege-level VM protection approach against compromised hypervisor

K Lin, W Liu, K Zhang, B Tu - … On Trust, Security And Privacy In …, 2019 - ieeexplore.ieee.org
Sensitive data in guest virtual machine is easy to be leaked once hypervisor is
compromised. Therefore, VM protection is important to protect the memory of VM from …