Policy enforcement and compliance proofs for Xen virtual machines

  • Authors:
  • Bernhard Jansen;Hari-Govind V. Ramasamy;Matthias Schunter

  • Affiliations:
  • IBM Zurich Research Laboratory, Rueschlikon, Switzerland;IBM T.J. Watson Research Center, Hawthorne, NY;IBM Zurich Research Laboratory, Rueschlikon, Switzerland

  • Venue:
  • Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We address the problem of integrity management in a virtualized environment. We introduce a formal integrity model for managing the integrity of arbitrary aspects of a virtualized system. Based on the model, we describe an architecture called PEV, which stands for protection, enforcement, and verification. The architecture generalizes the integrity management functions of the Trusted Platform Module (TPM) to cover not just software binaries, but also VMs, virtual devices, and a wide range of security policies. The architecture enables the verification of security compliance and enforcement of security policies. We describe a prototype implementation of the architecture based on the Xen hypervisor. We demonstrate the policy enforcement and compliance checking capabilities of our prototype through multiple use cases.