Contemporary commodity operating systems are too big and do not inspire trust in their security and reliability. Still they are used for processing sensitive data due to the vast amount of legacy software and good sup...
详细信息
ISBN:
(纸本)9781605584737
Contemporary commodity operating systems are too big and do not inspire trust in their security and reliability. Still they are used for processing sensitive data due to the vast amount of legacy software and good support for virtually all hardware devices. Common approaches used to ensure sensitive data protection are either too strict or not reliable. In this article we propose virtualization-based approach for preventing sensitive data leaks from a computer running untrusted commodity OS without sacrificing public network connectivity, computer usability and performance. It is based on separating privileges between two virtual machines: public VM that has unlimited network access and private (isolated) VM that is used for processing sensitive data. Virtual machine monitor uses public VM to provide transparent access to Internet for selected trusted applications running inside the private VM on a system call level. Proposed security architecture allows using one and the same untrusted OS on both virtual machines without necessity to encrypt sensitive data. However it poses a challenge of enforcing dynamic protection over the trusted applications running in the potentially compromised OS. We investigate this problem and provide our solution for it. Copyright 2009 ACM.
Article analysis consists the list the significance of the main results that were obtained when analyzing the graph-phonetic features of the first Cyrillic books in the XIX century:*** first Cyrillic books allow us to...
详细信息
This paper presents a calculation of the aerodynamic characteristics of the ZOHD Alpha Strike UAV model, designed with a delta wing. The focus of the study is the overall layout of the aircraft and the influence of th...
详细信息
PDF documents can contain incorrect textual layers due to low scanning quality, font embedding errors or other reasons. An incorrect text layer can significantly hamper automatic document processing and limit document...
详细信息
Efficient interactive rendering of large datasets still poses a problem. Widely used algorithm frustum culling is too conservative and leaves a lot of hidden objects in view. Occlusion culling with hardware occlusion ...
详细信息
Recently, Fuzzing is one of the most successful techniques to expose bugs in software. For testing large programs or large codebase with many features and entry-points, the creation of fuzz-targets remains a big chall...
详细信息
Reputation and competitiveness of both mobile applications and mobile operating systems depend on their quality. Developers are using various techniques to ensure high quality. Recently, exploratory testing approaches...
详细信息
Dynamic symbolic execution is a widely used technique for automated software testing, designed for execution paths exploration and program errors detection. A hybrid approach has recently become widespread, when the m...
详细信息
The article outlines the basic design principles of the Electronica SS BIS software and computing complex, aimed at addressing the most complex scientific problems. The developers have researched heterogeneous computi...
详细信息
Nowadays specialized distributed services and sig-nificant amounts of computing resources are used for solving tasks in Big Data processing and analysis. Cloud environments allow people to create virtual clusters with...
详细信息
暂无评论