Virtualized operating system kernel protection method
An operating system and virtualization technology, which is applied in the field of virtualized operating system kernel protection, can solve problems such as operating system kernel security issues, and achieve the effects of universality, high safety factor, and reduced overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0043] The present embodiment provides a virtualization-based operating system kernel protection method in an ARM platform, the method mainly comprising:
[0044] 1. Use virtualization technology to establish address space isolation between the operating system kernel and the virtual machine monitor running at privilege level 2 (ARM v8 corresponds to Execption Level 2, referred to as EL2 level, and ARM v7 corresponds to hyp mode), hereinafter referred to as running The hypervisor at the EL2 level is the Trusted Virtualized Execution Environment (THEE) and keeps the address space of THEE invisible to the operating system kernel.
[0045] 2. Make the operating system kernel unable to execute unauthorized code, and cannot access unauthorized data and registers, and protect sensitive memory segment permission configuration.
[0046] 3. Transparency of the operating system kernel's access to and execution of key kernel data to ensure the integrity of key data.
[0047] in particul...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

