G5 Doctoral dissertation (article)
Applications of hypervisors in security (2019)
Hyperviisoreiden sovelluksia tietoturvassa

Leon, R. S. (2019). Applications of hypervisors in security [Doctoral dissertation]. Jyväskylän yliopisto. JYU dissertations, 132. http://urn.fi/URN:ISBN:978-951-39-7854-9

JYU authors or editors

Publication details

All authors or editorsLeon, Roee Shimon


Journal or seriesJYU dissertations


Publication year2019

Number in series132

Number of pages in the book1 verkkoaineisto (87 sivua, 49 sivua useina numerointijaksoina, 23 numeroimatonta sivua) :

PublisherJyväskylän yliopisto

Place of PublicationJyväskylä

Publication countryFinland

Publication languageEnglish

Persistent website addresshttp://urn.fi/URN:ISBN:978-951-39-7854-9

Publication open accessOpenly available

Publication channel open accessOpen Access channel


As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern computer system typically has many security services installed on top of its operating system which include antivirus, application-control, IDS, firewall, and many more. Modern operating systems are a highly complex pieces of software which typically contains millions of lines of code. Furthermore, primarily due to endless hardware support, new code is regularly added, resulting in a security sink with an open drain. Most security services run on top of the operating system and, therefore, are subject to the security of the operating system and its applications. In case of a vulnerability, these services can be removed, thus rendering them them completely useless. This thesis proposes a thin hypervisor-based architecture for a system on top of which a variety of security services can be implemented. These services run in a secure, isolated environment. Furthermore, the proposed system can hide the presence of these security services. The proposed system architecture provides strong security guarantees. The thesis presents four common, heavily researched security problems and proposes four solutions, which are all based on the proposed architecture. The proposed solutions can compete, and even outperform current solutions, both in terms of security and performance.

Keywordsdata securityvirtualisationsystems architectureaccess controlmalwarereverse engineeringencryptionmemories (computing)

Free keywordstrusted computing; virtualization; hypervisor; thin hypervisor; unauthorised execution; malware analysis; code encryption; memory forensics

Contributing organizations

Ministry reportingYes

Reporting Year2019

Last updated on 2024-11-03 at 14:26