000 | 03964nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-030-25049-2 | ||
003 | DE-He213 | ||
005 | 20240423130141.0 | ||
007 | cr nn 008mamaa | ||
008 | 190920s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030250492 _9978-3-030-25049-2 |
||
024 | 7 |
_a10.1007/978-3-030-25049-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aVasudevan, Amit. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aPractical Security Properties on Commodity Computing Platforms _h[electronic resource] : _bThe uber eXtensible Micro-Hypervisor Framework / _cby Amit Vasudevan. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXIX, 85 p. 8 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5776 |
|
520 | _aThis SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation. uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called 'uberapps'). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation. The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues. The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aMicroprocessors. | |
650 | 0 | _aComputer architecture. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aProcessor Architectures. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030250485 |
776 | 0 | 8 |
_iPrinted edition: _z9783030250508 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5776 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-25049-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c185591 _d185591 |