Method for responding to trusted computing TOCTOU attacks on hardware virtual domain of Xen client
A technology of trusted computing and virtual domain, applied in computing, computer security devices, instruments, etc., can solve the problem of no public publication, and achieve the effect of less modification, strong scalability, and reduced system performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In the method provided by the present invention, an additional hypercall is defined between the privileged domain and the virtual machine monitor, represented by the variable T_hypercall, used for the privileged domain to transmit information to the virtual machine monitor, and 10 virtual interrupts (T_vIRQ) are defined , used for the virtual machine monitor to transmit information about a guest hardware virtual domain to the privileged domain, and each virtual interrupt corresponds to a running guest hardware virtual domain. The components of the response method include the forwarding module PickM and the attack signal processing module FpakM implemented in the privileged domain trusted simulation device module, the forwarding module AgentM implemented in the privileged domain kernel space, and the attack management module VMMmon implemented in the virtual machine monitor. Among them, the AgentM module implements the binding between DomID and T_vIRQ and transmits the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


