Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A case for secure and scalable hypervisor using safe language
Chen H., Zang B.  PMAM 2012 (Proceedings of the 2012 International Workshop on Programming Models and Applications for Multicores and Manycores, New Orleans, LA, Feb 26, 2012)134-139.2012.Type:Proceedings
Date Reviewed: Jul 9 2012

What good is body armor when you have feet of clay? Lots of effort is going into operating system (OS) security, but the OS is increasingly being virtualized, and the hypervisor (virtual machine manager) is more vulnerable than an OS. That’s the basic premise of this paper, which makes its point by detailing many vulnerabilities in current hypervisors.

To address these weaknesses, the authors propose rebuilding hypervisors in safe languages, instead of in C. They define “safe” as type-safe and object-oriented with built-in verification techniques. Their implementation of this idea is called SafeHype, and they review its goals and underlying architecture in the paper. However, it’s still in its preliminary stages, so the paper is more concerned with stating a position than with documenting research results.

At six pages (including an extensive reference section), the paper is a short read. There are some awkward English moments, but compared to my Chinese, the writing is excellent. It’s thought-provoking and should interest the security and programming language communities in addition to the hypervisor community.

I am curious as to why Ada (“the most advanced language for safe and secure software,” http://www.adacore.com/adaanswers/about/ada-2012/) wasn’t mentioned in the authors’ survey of language candidates, especially considering its 2012 revisions and the ease of adoption by C programmers, but that issue is not important for this review. What is important is that the authors have identified a very real and glaring software weakness and the principles that will fix it. Implementers can choose whatever tools they want.

Reviewer:  Bayard Kohlhepp Review #: CR140347 (1211-1155)
Bookmark and Share
  Featured Reviewer  
 
Organization And Design (D.4.7 )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Organization And Design": Date
Implicit system specification and the interface equation
Shields M. The Computer Journal 32(5): 399-412, 1989. Type: Article
Nov 1 1990
Disco: running commodity operating systems on scalable multiprocessors
Bugnion E., Devine S., Govil K., Rosenblum M. ACM Transactions on Computer Systems 15(4): 412-447, 1997. Type: Article
Sep 1 1998
Operating system support for persistent and recoverable computations
Rosenberg J., Dearle A., Hulse D., Lindström A., Norris S. Communications of the ACM 39(9): 62-69, 1996. Type: Article
Mar 1 1997
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy