skip to main content
10.1145/2420950.2421011acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Separation virtual machine monitors

Published: 03 December 2012 Publication History

Abstract

Separation kernels are the strongest known form of separation for virtual machines. We agree with NSA's Information Assurance Directorate that while separation kernels are stronger than any other alternative, their construction on modern commodity hardware is no longer justifiable. This is because of orthogonal feature creep in modern platform hardware. We introduce the separation VMM as a response to this situation and explain how we prototyped one.

References

[1]
Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ICR750-0101-GH01_REL running on Compact PCI card, version CPN 944-2021-021 with PowerPC, version 750cxe. Science International Applications Corporation (SAIC), September 2008.
[2]
J. Alves-Foss, W. S. Harrison, P. Oman, and C. Taylor. The MILS architecture for high assurance embedded systems. International Journal of Embedded Systems, 2((3/4)), 2006.
[3]
R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. Wiley Publishing, Inc., 2008.
[4]
A. Bensoussan, C. Clingen, and R. Daley. The Multics virtual memory: concepts and design. In Proc. Symposium on Operating Systems Principles (SOSP), 1969.
[5]
W. E. Bobert and R. Y. Kain. A practical alternative to heirarchical integrity policies. In Proc. 8th National Computer Security Conference, Gaithersburg, Maryland, US, 1985.
[6]
C. Boettcher, R. DeLong, J. Rushby, and W. Sifre. The MILS component integration approach to secure information sharing. In 27th IEEE/AIAA Digital Avionics Systems Conference, 2008.
[7]
D. Brewer and M. Nash. The Chinese wall security policy. In Proc. IEEE Symposium on Research in Security and Privacy, pages 206--214, Oakland, California, US, May 1989.
[8]
D. Chisnall. The Definitive Guide to the Xen Hypervisor. Prentice-Hall, 2008.
[9]
J. Franklin, S. Chaki, A. Datta, J. McCune, and A. Vasudevan. Parametric verification of address space separation. In Proc. 1st Conference on Principles of Security and Trust (POST), Tallin, EE, March 2012.
[10]
J. Franklin, S. Chaki, A. Datta, and A. Seshadri. Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size. In Proc. IEEE Symposium on Security and Privacy, Oakland, California, US, May 2010.
[11]
L. Freitas, J. McDermott, and J. Woodcock. Formal methods for security in the Xenon hypervisor. International Journal on Software Tools for Technology Transfer (STTT), 13(5): 463--489, 2011.
[12]
L. Hatton. EC-- a measurement based safer subset of ISO C suitable for embedded systems development. Information and Software Technology, 47(3): 181--187, 2005.
[13]
C. Heitmeyer, M. Archer, E. Leonard, and J. McLean. Formal specification and verification of data separation in a separation kernel for an embedded system. In Proc. 13 ACM Conf. on Computer and Communications Security, Alexandria, Virginia, US, 2006.
[14]
T. Jaeger and J. Tidswell. Practical safety in flexible access control models. ACM Trans. on Information and System Security, 4(2): 158--190, May 2001.
[15]
P. Karger and R. Schell. Thirty years later: Lessons from the Multics security evaluation. In In Proc. Annual Computer Security Applications Conference, 2002.
[16]
E. Keller, J. Szefer, J. Rexford, and R. Lee. Virtualized cloud infrastructure without the virtualization. In International Symposium on Computer Architecture (ISCA). IEEE Computer Society Press, June 2010.
[17]
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cook, P. Derrin, D. Elkaduwe, K. Englehardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an OS kernel. In Proc. 22nd ACM Symposium on Operating System Principles, Big Sky, MT, US, October 2009.
[18]
C. Lattner. LLVM: An infrastructure for multi-stage optimization. Master's thesis, Computer Science Dept., University of Illinois at Urbana-Champaign, 2002.
[19]
J. McDermott and L. Freitas. A formal security policy model for Xenon. In Proc. Formal Methods in Security Engineering (FMSE '08), October 2008.
[20]
J. McDermott, J. Kirby, B. Montrose, T. Johnson, and M. Kang. Re-engineering Xen internals for higher-assurance security. Information Security Technical Report, 13(1): 17--24, 2008.
[21]
J. McDermott, B. Montrose, M. Li, J. Kirby, and M. Kang. The Xenon separation VMM: Secure virtualization infrastructure for military clouds. In Military Communications Conference - MILCOM 2012, Orlando, FL, US, October 2012.
[22]
B. Randell and J. Rushby. Distributed secure systems: Then and now. In 23rd Annual Computer Security Applications Conference (ACSAC), Miami, FL, US, December 2007.
[23]
A. Roscoe. CSP and determinism in security modelling. In Proc. IEEE Symposium on Security and Privacy, Oakland, California, US, May 1995.
[24]
A. Roscoe, J. Woodcock, and L. Wulf. Non-interference through nondeterminism. In Proc. ESORICS, Brighton, UK, November 1994.
[25]
S. Rueda, H. Vijayakumar, and T. Jaeger. Analysis of virtual machine system policies. In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 2009.
[26]
J. Rushby. Design and verification of secure systems. Proc. ACM Symposium on Operating System Principles, 15: 12--21, 1981.
[27]
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn. Building a MAC-Based security architecture for the Xen open-source hypervisor. In Proc. 21st Annual Computer Security Applications Conference, Tucson, Arizona, US, December 2005.
[28]
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. BitVisor: a thin hypervisor for enforcing I/O device security. In Proc. 2009 ACM SIGPLAN/SIGOPS Int. Conf. on Virtual Execution Environments, pages 121--130, Washington, DC, US, 2009.
[29]
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau. The Flask security architecture: system support for diverse security policies. In Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, Washington, DC, US, 1999.
[30]
U. Steinberg and B. Kauer. NOVA: a microhypervisor-based secure virtualization architecture. In Proc. 5th European conference on Computer Systems, pages 209--222, Paris, FR, 2010.
[31]
Systems and N. A. Center. Separation Kernels on Commodity Workstations. Information Assurance Directorate, NSA, March 2010.
[32]
J. Szefer, E. Keller, R. Lee, and J. Rexford. Eliminating the hypervisor attack surface for a more secure cloud. In Proc. Computer and Communications Security, Chicago, IL, US, October 2011. ACM.
[33]
C. Takemura and L. Crawford. The Book of Xen. No Starch Press, 2010.
[34]
K. Walker, D. Sterne, M. L. Badger, M. Petkac, D. Shermann, and K. Oostendorp. Confining root programs with domain and type enforcement (DTE). In Proc. 6th USENIX UNIX Security Symposium, San Jose, California, US, July 1996.
[35]
Z. Wang and X. Jiang. HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In Proc. 31st IEEE Symposium on Security & Privacy, Oakland, California, US, May 2010.
[36]
A. Watson and T. McCabe. Structured Testing: A Testing Methodology Using the Cyclomatic Complexity Metric, NIST Special Publication 500--235. National Institute of Standards and Technology, 1996.
[37]
J. Woodcock, A. Cavalcanti, M.-C. Godel, and L. Freitas. Operational semantics of Circus. Formal aspects of computing, 2008. in press.
[38]
F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proc. 23rd ACM Symp. on Operating Systems Principles (SOSP), pages 203--216, Cascais, Portugal, 2011.

Cited By

View all

Index Terms

  1. Separation virtual machine monitors

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACSAC '12: Proceedings of the 28th Annual Computer Security Applications Conference
    December 2012
    464 pages
    ISBN:9781450313124
    DOI:10.1145/2420950
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ACSA: Applied Computing Security Assoc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 December 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. hypervisor
    2. open source
    3. virtual machine monitor (VMM)
    4. virtualization

    Qualifiers

    • Research-article

    Conference

    ACSAC '12
    Sponsor:
    • ACSA
    ACSAC '12: Annual Computer Security Applications Conference
    December 3 - 7, 2012
    Florida, Orlando, USA

    Acceptance Rates

    ACSAC '12 Paper Acceptance Rate 44 of 231 submissions, 19%;
    Overall Acceptance Rate 104 of 497 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media