Using hypervisor to provide data secrecy for user applications on a per-page basis
- 5 March 2008
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers and data centers. Aside from server applications, hypervisors are also becoming a popular target for implementing many security systems, since they provide a small and easy-to-secure trusted computing base. This paper presents a novel way of using hypervisors to protect application data privacy even when the underlying operating system is not trustable. Each page in virtual address space is rendered to user applications according to the security context the application is running in. The hypervisor encrypts and decrypts each memory page requested depending on the application's access permission to the page. The main result of this system is the complete removal of the operating system from the trust base for user applications' data privacy. To reduce the runtime overhead of the system, two optimization techniques are employed. We use page-frame replication to reduce the number ofcryptographic operations by keeping decrypted versions of a page frame. We also employ lazy synchronization to minimize overhead due to an update to one of the replicated page frame. Our system is implemented and evaluated by modifying the Xen hypervisor, showing that it increases the application execution time only by 3% for CPU and memory-intensive workloads.Keywords
This publication has 21 references indexed in Scilit:
- SecVisorPublished by Association for Computing Machinery (ACM) ,2007
- Reducing TCB complexity for security-sensitive applicationsPublished by Association for Computing Machinery (ACM) ,2006
- Detecting past and present intrusions through vulnerability-specific predicatesPublished by Association for Computing Machinery (ACM) ,2005
- MondrixPublished by Association for Computing Machinery (ACM) ,2005
- Obfuscation of executable code to improve resistance to static disassemblyPublished by Association for Computing Machinery (ACM) ,2003
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- AEGISPublished by Association for Computing Machinery (ACM) ,2003
- Watermarking, tamper-proofing, and obfuscation - tools for software protectionIEEE Transactions on Software Engineering, 2002
- Untrusted hosts and confidentialityPublished by Association for Computing Machinery (ACM) ,2001
- Protection and the control of information sharing in multicsCommunications of the ACM, 1974