Some ideas on virtualized system security, and monitors

  • Authors:
  • Hedi Benzina;Jean Goubault-Larrecq

  • Affiliations:
  • LSV, ENS Cachan, CNRS, INRIA, Cachan, France;LSV, ENS Cachan, CNRS, INRIA, Cachan, France

  • Venue:
  • DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Virtualized systems such as Xen, VirtualBox, VMWare or QEmu have been proposed to increase the level of security achievable on personal computers. On the other hand, such virtualized systems are now targets for attacks. We propose an intrusion detection architecture for virtualized systems, and discuss some of the security issues that arise. We argue that a weak spot of such systems is domain zero administration, which is left entirely under the administrator's responsibility, and is in particular vulnerable to trojans. To avert some of the risks, we propose to install a role-based access control model with possible role delegation, and to describe all undesired activity flows through simple temporal formulas. We show how the latter are compiled into Orchids rules, via a fragment of linear temporal logic, through a generalization of the so-called history variable mechanism.