E2VT: An effective and efficient VM-transparent mechanism for preventing TPVM OS boot failure

Xiaolin Chang*, Bin Xing, Jogesh K. Muppala

*Corresponding author for this work

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

Abstract

Integrating system-level virtualization technology with Trusted Computing technology can significantly improve system security. The open-source virtual TPM facility, shipped with the open-source hypervisor Xen, aims to provide the illusion of a physical TPM to TPM-based trusted software executed in trusted virtual machines (TVMs) such that TPMbased trusted software works well in a TVM as in a native Operating System (OS). However, it is not true for the trusted software which works in a trusted para-virtual machine (TPVM). The TPM command packets sent in the TPVM OS boot phase may cause the TPVM OS boot failure. This paper design and implement E2VT, an effective and efficient mechanism for preventing the TPVM OS boot failure while (1) being transparent to the TPVM system, (2) maintaining the original system performance, (3) making minimal modifications to the existing architecture. We validate our analysis and design through experiments.

Original languageEnglish
Title of host publicationProceedings - 2012 IEEE Asia-Pacific Services Computing Conference, APSCC 2012
Pages341-344
Number of pages4
DOIs
Publication statusPublished - 2012
Event2012 7th IEEE Asia-Pacific Services Computing Conference, APSCC 2012 - Guilin, China
Duration: 6 Dec 20128 Dec 2012

Publication series

NameProceedings - 2012 IEEE Asia-Pacific Services Computing Conference, APSCC 2012

Conference

Conference2012 7th IEEE Asia-Pacific Services Computing Conference, APSCC 2012
Country/TerritoryChina
CityGuilin
Period6/12/128/12/12

Keywords

  • Trusted computing
  • Virtual machine
  • Virtual trusted platform module
  • Xen

Fingerprint

Dive into the research topics of 'E2VT: An effective and efficient VM-transparent mechanism for preventing TPVM OS boot failure'. Together they form a unique fingerprint.

Cite this