Practical Security Properties on Commodity Computing Platforms is popular PDF and ePub book, written by Amit Vasudevan in 2019, it is a fantastic choice for those who relish reading online the Computer science genre. Let's immerse ourselves in this engaging Computer science book by exploring the summary and details provided below. Remember, Practical Security Properties on Commodity Computing Platforms can be Read Online from any device for your convenience.

Practical Security Properties on Commodity Computing Platforms Book PDF Summary

This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation. uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called 'uberapps'). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation. The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues. The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.

Detail Book of Practical Security Properties on Commodity Computing Platforms PDF

Practical Security Properties on Commodity Computing Platforms
  • Author : Amit Vasudevan
  • Release : 01 October 2024
  • Publisher : Unknown
  • ISBN : 3030250504
  • Genre : Computer science
  • Total Page : 85 pages
  • Language : English
  • PDF File Size : 13,6 Mb

If you're still pondering over how to secure a PDF or EPUB version of the book Practical Security Properties on Commodity Computing Platforms by Amit Vasudevan, don't worry! All you have to do is click the 'Get Book' buttons below to kick off your Download or Read Online journey. Just a friendly reminder: we don't upload or host the files ourselves.

Get Book

Trustworthy Execution on Mobile Devices

Trustworthy Execution on Mobile Devices Author : Amit Vasudevan,Jonathan M. McCune,James Newsome
Publisher : Springer Science & Business Media
File Size : 36,6 Mb
Get Book
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why w...

Computer Security ESORICS 2016

Computer Security     ESORICS 2016 Author : Ioannis Askoxylakis,Sotiris Ioannidis,Sokratis Katsikas,Catherine Meadows
Publisher : Springer
File Size : 8,6 Mb
Get Book
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Sym...

Bootstrapping Trust in Modern Computers

Bootstrapping Trust in Modern Computers Author : Bryan Parno,Jonathan M. McCune,Adrian Perrig
Publisher : Springer Science & Business Media
File Size : 44,5 Mb
Get Book
Trusting a computer for a security-sensitive task (such as checking email or banking online) require...

Trust and Trustworthy Computing

Trust and Trustworthy Computing Author : Stefan Katzenbeisser,Edgar Weippl,L. Jean Camp,Melanie Volkamer,Mike Reiter,Xinwen Zhang
Publisher : Springer
File Size : 43,6 Mb
Get Book
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trus...

Trust and Trustworthy Computing

Trust and Trustworthy Computing Author : Michael Huth,N. Asokan,Srdjan Capkun,Ivan Flechais,Lizzie Coles-Kemp
Publisher : Springer
File Size : 35,7 Mb
Get Book
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trus...

Trusted Computing Platforms

Trusted Computing Platforms Author : Sean W. Smith
Publisher : Springer
File Size : 50,9 Mb
Get Book
How can one trust computation taking place at a remote site, particularly if a party at that site mi...

Security in the Private Cloud

Security in the Private Cloud Author : John R. Vacca
Publisher : CRC Press
File Size : 27,6 Mb
Get Book
This comprehensive handbook serves as a professional reference and practitioner’s guide to today�...