Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture

  • Authors:
  • Amit Vasudevan;Jonathan M. McCune;Ning Qu;Leendert Van Doorn;Adrian Perrig

  • Affiliations:
  • CyLab, Carnegie Mellon University, Pittsburgh, PA;CyLab, Carnegie Mellon University, Pittsburgh, PA;Nvidia Corp., Santa Clara, CA;Advanced Micro Devices Corp., Austin, TX;CyLab, Carnegie Mellon University, Pittsburgh, PA

  • Venue:
  • TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardware that includes virtualization support, observing that without the fundamental property of hypervisor integrity, no secrecy properties can be achieved. Unfortunately, we find that significant issues remain for constructing an integrity-protected hypervisor on such hardware. Based on our analysis, we describe a set of necessary rules that must be followed by hypervisor developers and users to maintain hypervisor integrity. No current hypervisor we are aware of adheres to all the rules. No current x86 hardware platform we are aware of even allows for the construction of an integrity-protected hypervisor. We provide a perspective on secure virtualization and outline a research agenda for achieving truly secure hypervisors.