首页 | 本学科首页   官方微博 | 高级检索  
     

基于虚拟机技术的非可信软件对抗方法研究
引用本文:龙小书,张小松,王鼎. 基于虚拟机技术的非可信软件对抗方法研究[J]. 信息安全与通信保密, 2009, 0(8): 203-205
作者姓名:龙小书  张小松  王鼎
作者单位:电子科技大学,计算机科学与工程学院,四川,成都,611731
基金项目:四川省科技支撑计划资助项目 
摘    要:当前对程序隔离技术的研究难以同时兼顾程序功能的完整性以及计算环境的重现。针对这个问题,文中对当前的隔离技术进行改进,并提出了一种新的名为SVMM(Safe Virtual Machine Model)的程序隔离技术模型,该模型能更好的支持程序功能完整性,计算环境的重现及隔离,且具有较少的开销。

关 键 词:虚拟机  非可信软件  计算环境重现  SVMM  隔离执行环境

Research on Methods to Combat Non-Credible Software Based on Virtual Machine Technology
LONG Xiao-shu,ZHANG Xiao-song,WANG Ding. Research on Methods to Combat Non-Credible Software Based on Virtual Machine Technology[J]. China Information Security, 2009, 0(8): 203-205
Authors:LONG Xiao-shu  ZHANG Xiao-song  WANG Ding
Affiliation:(School of Computer science and Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 611731, China)
Abstract:Current research on Isolated execution environment could not provide both the integrity of program functionality and the recurrence of computing environment. To resolve this problem, this paper gives an improvement on current isolation techniques and puts forward a new program isolation technique model, named SVMM(Safe Virtual Machine Model), which performs better in the integrity of program functionality and the recurrence of computing environment and isolation while has relatively low overhead.
Keywords:SVMM
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号