Abstract
The article considers the need to use modern virtualization tools in the process of developing, assembling and testing software and hardware data security tools. Such data security tools include hardware components that implement key security functions, but also impede the use of number of testing tools. The use of virtualization tools for software and hardware data security tools allows to perform security checks, which are difficult to test on physical computing hardware, for example: security functions that run independently of the operating system of computing facility or before starting the user session. However, using virtualization tools may degrade the “purity” of the testing process, so it is necessary to ensure that software implementation of the hardware devices’ virtual connection interfaces and virtual machine components comply with existing standards and specifications. Depending on the connection interface of hardware components of data security tools, it is possible to use the built-in capabilities of virtualization tools or existing AMD IOMMU and Intel Vt-d technologies to redirect these components to a virtual environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kanner, T.M.: Features of using virtualization for testing software and hardware data security tools (In Russian). Inf. Secur. 18(3), 416–419 (2015)
Sinyakin, S.A.: Characteristic features of Accord-TSHM compatibility in modern computers (In Russian). In: XVIII International Conference, Complex Data Protection 2013. Elektronika Info, vol. 6, pp. 142–144. Brest, Belarus (2013)
Kanner, T.M.: Applicability of software testing methods to software and hardware data security tools. Glob. J. Pure Appl. Math. 12(1), 167–190 (2016)
Wong, A.: Breaking Through the BIOS Barrier: The Definitive BIOS Optimization Guide for PCs. Prentice Hall PTR, Upper Saddle, New Jersey (2004)
Zimmer, V., Lewis, T., Rothman, M.: Harnessing the UEFI Shell: Moving the Platform Beyond Dos. Intel Press, Germany, Berlin (2010)
AMD I/O Virtualization Technology (IOMMU) Specification Revision 1.26. http://developer.amd.com/wordpress/media/2012/10/34434-IOMMU-Rev_1.26_2-11-09.pdf. Last accessed 27 June 2019
Intel Virtualization Technology for Directed I/O (VT-d) Architecture Specification. http://www.intel.com/content/www/us/en/embedded/technology/virtualization/vt-directed-io-spec.html. Last accessed 27 June 2019
Kanner, T.M.: The effectiveness of using supporting tools for testing software and hardware DST (In Russian). Inf. Secur. Quest. 2, 9–13 (2017)
VMware Workstation Documentation Center. Use Unity Mode. https://pubs.vmware.com/workstation-9/index.jsp. Last accessed 27 June 2019
Oracle VM VirtualBox User Manual. Seamless windows. https://www.virtualbox.org/manual/ch04.html#seamlesswindows. Last accessed 27 June 2019
Parallels Desktop User’s Guide. Working in Coherence. http://download.parallels.com/desktop/v4/docs/en/Parallels_Desktop_Users_Guide/23413.htm. Last accessed 27 June 2019
Kanner, A.M., Kanner, T.M.: Applying a mathematical approach to interpreting the results of testing software and hardware data security tools during the verification process. J. Eng. Appl. Sci. 14(10), 3482–3491 (2019)
Kanner, T.M.: Adaptation of existing verification methods for software and hardware DST (In Russian). Inf. Secur. Quest. 1, 13–19 (2018)
Kanner, A.M., Ukhlinov, L.M.: Access control in GNU/Linux (in Russian). Inf. Secur. Quest. 3, 35–38 (2012)
Kanner, A.M.: Correctness of data security tools for protection against unauthorized access and their interaction in GNU/Linux. Glob. J. Pure Appl. Math. 12(3), 2479–2501 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Epishkina, A.V., Kanner, A.M., Kanner, T.M. (2020). Comprehensive Testing of Software and Hardware Data Security Tools Using Virtualization. In: Misyurin, S., Arakelian, V., Avetisyan, A. (eds) Advanced Technologies in Robotics and Intelligent Systems. Mechanisms and Machine Science, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-33491-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-33491-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33490-1
Online ISBN: 978-3-030-33491-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)