首页> 外文期刊>ACM Computing Surveys >Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems
【24h】

Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

机译:虚拟化系统的攻击,威胁模型和解决方案的演变

获取原文
获取原文并翻译 | 示例
       

摘要

Virtualization technology enables Cloud providers to efficiently use their computing services and resources. Even if the benefits in terms of performance, maintenance, and cost are evident, however, virtualization has also been exploited by attackers to devise new ways to compromise a system. To address these problems, research security solutions have evolved considerably over the years to cope with new attacks and threat models. In this work, we review the protection strategies proposed in the literature and show how some of the solutions have been invalidated by new attacks, or threat models, that were previously not considered. The goal is to show the evolution of the threats, and of the related security and trust assumptions, in virtualized systems that have given rise to complex threat models and the corresponding sophistication of protection strategies to deal with such attacks. We also categorize threat models, security and trust assumptions, and attacks against a virtualized system at the different layers-in particular, hardware, virtualization, OS, and application.
机译:虚拟化技术使云提供商可以有效地使用其计算服务和资源。即使在性能,维护和成本方面的好处是显而易见的,但是,攻击者还利用虚拟化来设计新方法来危害系统。为了解决这些问题,多年来,研究安全解决方案已经得到了很大发展,以应对新的攻击和威胁模型。在这项工作中,我们回顾了文献中提出的保护策略,并说明了某些解决方案是如何被以前未考虑的新攻击或威胁模型所无效的。目的是显示虚拟化系统中威胁的演变以及相关的安全性和信任假设,这些虚拟化系统引起了复杂的威胁模型和相应的保护策略,以应对此类攻击。我们还将威胁模型,安全性和信任假设以及针对虚拟化系统在不同层(尤其是硬件,虚拟化,操作系统和应用程序)的攻击进行分类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号