VAX architecture reference manual
VAX architecture reference manual
Building a secure computer system
Building a secure computer system
Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Virtualizing the VAX architecture
ISCA '91 Proceedings of the 18th annual international symposium on Computer architecture
Synchronization with eventcounts and sequencers
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection in operating systems
Communications of the ACM
Formal requirements for virtualizable third generation architectures
Communications of the ACM
A note on the confinement problem
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
Operating Systems
Proceedings of the workshop on virtual computer systems
The PDP-11 virtual machine architecture: A case study
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
PROCESSOR MULTIPLEXING IN A LAYED OPERATING SYSTEM
PROCESSOR MULTIPLEXING IN A LAYED OPERATING SYSTEM
USING TYPE EXTENSION TO ORGANIZE VIRTUAL MEMORY MECHANISMS
USING TYPE EXTENSION TO ORGANIZE VIRTUAL MEMORY MECHANISMS
Program confinement in KVM/370
ACM '77 Proceedings of the 1977 annual conference
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors
Proceedings of the seventeenth ACM symposium on Operating systems principles
Cellular disco: resource management using virtual clusters on shared-memory multiprocessors
ACM Transactions on Computer Systems (TOCS)
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Vulnerabilities in Synchronous IPC Designs
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Scale and performance in the Denali isolation kernel
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Increased Information Flow Needs for High-Assurance Composite Evaluations
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Scale and performance in the Denali isolation kernel
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
A logical approach to multilevel security of probabilistic systems
Distributed Computing
A software flaw taxonomy: aiming tools at security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Manitou: a layer-below approach to fighting malware
Proceedings of the 1st workshop on Architectural and system support for improving software dependability
Operating system support for virtual machines
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Performance and security lessons learned from virtualizing the alpha processor
Proceedings of the 34th annual international symposium on Computer architecture
Flexible OS support and applications for trusted computing
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Make least privilege a right (not a privilege)
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
VMM-based hidden process detection and identification using Lycosid
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Active semantically aware hard real-time security hypervisors
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Practical Techniques for Operating System Attestation
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Flexible security configuration for virtual machines
Proceedings of the 2nd ACM workshop on Computer security architectures
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enforcing performance isolation across virtual machines in Xen
Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Securing virtual machine monitors: what is needed?
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Laminar: practical fine-grained decentralized information flow control
Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
An architecture providing virtualization-based protection mechanisms against insider attacks
WISA'07 Proceedings of the 8th international conference on Information security applications
Security for the cloud infrastructure: trusted virtual data center implementation
IBM Journal of Research and Development
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Retaining sandbox containment despite bugs in privileged memory-safe code
Proceedings of the 17th ACM conference on Computer and communications security
Lyrebird: assigning meanings to machines
SSV'10 Proceedings of the 5th international conference on Systems software verification
Information flow isolation in I2C and USB
Proceedings of the 48th Design Automation Conference
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Enforcing performance isolation across virtual machines in xen
Middleware'06 Proceedings of the 7th ACM/IFIP/USENIX international conference on Middleware
Implementing a high-assurance smart-card OS
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Trust extension for commodity computers
Communications of the ACM
An approach to a trustworthy system architecture using virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Practical probability: applying pGCL to lattice scheduling
ITP'13 Proceedings of the 4th international conference on Interactive Theorem Proving
Hi-index | 0.02 |
The development of a virtual-machine monitor (VMM) security kernel for the VAX architecture is described. The focus is on how the system's hardware, microcode, and software are aimed at meeting A1-level security requirements while maintaining the standard interfaces and applications of the VMS and ULTRIX-32 operating systems. The VAX security kernel supports multiple concurrent virtual machines on a single VAX system, providing isolation and controlled sharing of sensitive data. Rigorous engineering standards were applied during development to comply with the assurance requirements for verification and configuration management. The VAX security kernel has been developed with a heavy emphasis on performance and system management tools. The kernel performs sufficiently well that much of its development was carried out in virtual machines running on the kernel itself, rather than in a conventional time-sharing system.