RT Journal Article
JF 2009 Cybersecurity Applications & Technology Conference for Homeland Security. CATCH 2009
YR 2009
VO 00
SP 91
TI Information-Flow Aware Virtual Machines: Foundations for Trustworthy Computing
A1 Michael Franz,
K1 system security engineering
K1 vulnerability prevention
K1 virtual machines
AB Many software systems in use today have enormous trusted computing bases (TCBs). We propose an architecture that makes it possible to shrink the TCB of many such systems. Our solution is based on a virtual-machine (VM) with added information-flow capabilities. In our architecture, all application programs run outside of the TCB under the control of the VM and cannot cause information leaks even if they try. We have implemented a prototype of this architecture and found that the resulting run-time overhead is much lower than expected. In many deployment contexts, it will be perfectly reasonable to make such a moderate performance sacrifice for the benefit of security.
PB IEEE Computer Society, [URL:http://www.computer.org]
LA English
DO 10.1109/CATCH.2009.45
LK http://doi.ieeecomputersociety.org/10.1109/CATCH.2009.45