Execution of Critical Application in Corrupted Environment Using Vmm

S. Valarmathi
2013 IOSR Journal of Computer Engineering  
A resilient execution environment can be developed for a critical application even in the presence of corrupted OS kernel. The attacker tries to capture the application content by corrupting the OS when an application is executing. In previous case the attacker corrupts the OS by injecting code then the application terminates immediately without executing it. In this current system even in the presence of corruption the application is executed with out any interception and it provide a
more » ... authenticated execution of critical application in entrusted environment by using Virtual Machine Monitor (VMM). VMM is a monitoring technique to monitor all the activities during execution and it is one of the online based recovery schemes to identify any such corruption. It repairs the memory corruption and allows the process for normal execution. VMM solutions generally broadcast into two categories they are memory authentication and memory duplication. Memory authentication is to check the integrity of an application and memory duplication is to rectify the corruption. The proposed system is applied for military application, hospitals, and colleges and for all critical applications.
doi:10.9790/0661-0931115 fatcat:we62yfjbard2dbako33xs4zsxu