{"id":25367,"updated":"2025-01-22T19:32:12.885198+00:00","links":{},"created":"2025-01-18T22:56:15.795358+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00025367","sets":["1164:1867:1870:1871"]},"path":["1871"],"owner":"1","recid":"25367","title":["準パススルー型仮想マシンモニタBitVisorの設計と実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2008-07-30"},"_buckets":{"deposit":"18090d14-f529-4647-98bb-05353ecd0e9d"},"_deposit":{"id":"25367","pid":{"type":"depid","value":"25367","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"準パススルー型仮想マシンモニタBitVisorの設計と実装","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"準パススルー型仮想マシンモニタBitVisorの設計と実装"},{"subitem_title":"BitVisor: Design and Implementation of the Para-Pass-Through Virtual Machine Monitor","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2008-07-30","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"豊田工業高等専門学校情報工学科"},{"subitem_text_value":"東京工業大学大学院情報理工学研究科数理・計算科学専攻"},{"subitem_text_value":"電気通信大学電気通信学部情報工学科"},{"subitem_text_value":"奈良先端科学技術大学院大学情報科学研究科"},{"subitem_text_value":"慶應義塾大学理工学部情報工学科"},{"subitem_text_value":"東京工業大学大学院情報理工学研究科数理・計算科学専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"},{"subitem_text_value":"筑波大学大学院システム情報工学研究科コンピュータサイエンス専攻"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Computer Engineering, Toyota National College of Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Mathematical and Computing Sciences, Graduate School of Information Science and Engineering, Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Faculty of Electro-Communications, The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science, Nara Institute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Computer Science, Faculty of Science and Technology, Keio University","subitem_text_language":"en"},{"subitem_text_value":"Department of Mathematical and Computing Sciences, Graduate School of Information Science and Engineering, Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/25367/files/IPSJ-OS08109010.pdf"},"date":[{"dateType":"Available","dateValue":"2010-07-30"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-OS08109010.pdf","filesize":[{"value":"801.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"11"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f6d098ad-a11b-418a-9314-c5991e843b8e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2008 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"品川, 高廣"},{"creatorName":"榮樂, 英樹"},{"creatorName":"谷本, 幸一"},{"creatorName":"面和成"},{"creatorName":"長谷川, 晶一"},{"creatorName":"保理江, 高志"},{"creatorName":"平野, 学"},{"creatorName":"光来, 健一"},{"creatorName":"大山恵弘"},{"creatorName":"河合, 栄治"},{"creatorName":"河野, 健二"},{"creatorName":"千葉, 滋"},{"creatorName":"新城, 靖"},{"creatorName":"加藤, 和彦"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takahiro, Shinagawa","creatorNameLang":"en"},{"creatorName":"Hideki, Eiraku","creatorNameLang":"en"},{"creatorName":"Kouichi, Tanimoto","creatorNameLang":"en"},{"creatorName":"Kazumasa, Omote","creatorNameLang":"en"},{"creatorName":"Syoichi, Hasegawa","creatorNameLang":"en"},{"creatorName":"Takashi, Horie","creatorNameLang":"en"},{"creatorName":"Manabu, Hirano","creatorNameLang":"en"},{"creatorName":"Kenichi, Kourai","creatorNameLang":"en"},{"creatorName":"Yoshihiro, Ohyama","creatorNameLang":"en"},{"creatorName":"Eiji, Kawai","creatorNameLang":"en"},{"creatorName":"Kenji, Kono","creatorNameLang":"en"},{"creatorName":"Shigeru, Chiba","creatorNameLang":"en"},{"creatorName":"Yasushi, Shinjo","creatorNameLang":"en"},{"creatorName":"Kazuhiko, Kato","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10444176","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,仮想マシン技術を用いてセキュリティ機能を実現する研究が増えつつある.しかし従来の仮想マシンモニタでは,ハードウェアの仮想化や複数 OS 間の保護・共有のために多数の機能が必要であり,仮想マシンモニタのサイズの肥大化が問題となる.本論文では,セキュリティ機能の実現を目的とした仮想マシンモニタ向けのアーキテクチャとして,準パススルー型と呼ぶ方式を提案する.準パススルー型仮想マシンモニタでは,ハードウェアへのアクセスの多くをパススルーすることにより,仮想化や共有機能を省略して仮想マシンモニタの肥大化を抑制する.一方,最低限必要なアクセスだけを仮想マシンモニタで捕捉することにより,確実にセキュリティ機能を実現することができる.実際に実装した結果,仮想マシンモニタのコア機能は 2 万行程度,ATA デバイスに対するドライバは 1200 行程度で実現できた.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, virtual machine technology is used by a number of researches to provide security services. Unfortunately, existing virtual machine monitors have various functionalities, such as hardware virtualization, protection and sharing of resources among guest operating systems, resulting in the growing size of virtual machine monitors. This paper presents the para-pass-through architecture, designed to minimize the code size of virtual machine monitores that provide security services. By allowing pass-through access to most of hardware devices from the guest operating system, a large part of virtualization and sharing functionalities can be eliminted from virtual machine monotors, while successfully enforcing necesarry security services by intercepting least necessary access by virtual machine monitors. The code sizes of our implementation are approximately 20 thousand lines for the core of the virtual machine monitor and 1.2 thousand lines for the driver of ATA devices.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"76","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告システムソフトウェアとオペレーティング・システム(OS)"}],"bibliographicPageStart":"69","bibliographicIssueDates":{"bibliographicIssueDate":"2008-07-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"77(2008-OS-109)","bibliographicVolumeNumber":"2008"}]},"relation_version_is_last":true,"weko_creator_id":"1"}}