Hypervisor-Based Integrity: Protecting Guest Kernels in Cloud Environments

Hypervisor-Based Integrity: Protecting Guest Kernels in Cloud Environments

Linux Foundation via YouTube Direct link

Disclaimer

2 of 16

2 of 16

Disclaimer

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Hypervisor-Based Integrity: Protecting Guest Kernels in Cloud Environments

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Google Cloud
  2. 2 Disclaimer
  3. 3 Background
  4. 4 Threat Model
  5. 5 Protect the guest kernel at runtime
  6. 6 Why hypervisor as another security layer?
  7. 7 Overall Plan - Boot Time: Guest
  8. 8 Overall Plan - Boot Time: Hypervisor
  9. 9 Overall Plan - Run Time
  10. 10 Performance Impact
  11. 11 Technical challenges
  12. 12 Example
  13. 13 Changes needed for KVM/QEMU
  14. 14 For the Future
  15. 15 Other security considerations
  16. 16 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.