Skip to main content

Comprehensive Testing of Software and Hardware Data Security Tools Using Virtualization

  • Conference paper
  • First Online:
Advanced Technologies in Robotics and Intelligent Systems

Part of the book series: Mechanisms and Machine Science ((Mechan. Machine Science,volume 80))

  • 755 Accesses

Abstract

The article considers the need to use modern virtualization tools in the process of developing, assembling and testing software and hardware data security tools. Such data security tools include hardware components that implement key security functions, but also impede the use of number of testing tools. The use of virtualization tools for software and hardware data security tools allows to perform security checks, which are difficult to test on physical computing hardware, for example: security functions that run independently of the operating system of computing facility or before starting the user session. However, using virtualization tools may degrade the “purity” of the testing process, so it is necessary to ensure that software implementation of the hardware devices’ virtual connection interfaces and virtual machine components comply with existing standards and specifications. Depending on the connection interface of hardware components of data security tools, it is possible to use the built-in capabilities of virtualization tools or existing AMD IOMMU and Intel Vt-d technologies to redirect these components to a virtual environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kanner, T.M.: Features of using virtualization for testing software and hardware data security tools (In Russian). Inf. Secur. 18(3), 416–419 (2015)

    Google Scholar 

  2. Sinyakin, S.A.: Characteristic features of Accord-TSHM compatibility in modern computers (In Russian). In: XVIII International Conference, Complex Data Protection 2013. Elektronika Info, vol. 6, pp. 142–144. Brest, Belarus (2013)

    Google Scholar 

  3. Kanner, T.M.: Applicability of software testing methods to software and hardware data security tools. Glob. J. Pure Appl. Math. 12(1), 167–190 (2016)

    Google Scholar 

  4. Wong, A.: Breaking Through the BIOS Barrier: The Definitive BIOS Optimization Guide for PCs. Prentice Hall PTR, Upper Saddle, New Jersey (2004)

    Google Scholar 

  5. Zimmer, V., Lewis, T., Rothman, M.: Harnessing the UEFI Shell: Moving the Platform Beyond Dos. Intel Press, Germany, Berlin (2010)

    Google Scholar 

  6. AMD I/O Virtualization Technology (IOMMU) Specification Revision 1.26. http://developer.amd.com/wordpress/media/2012/10/34434-IOMMU-Rev_1.26_2-11-09.pdf. Last accessed 27 June 2019

  7. Intel Virtualization Technology for Directed I/O (VT-d) Architecture Specification. http://www.intel.com/content/www/us/en/embedded/technology/virtualization/vt-directed-io-spec.html. Last accessed 27 June 2019

  8. Kanner, T.M.: The effectiveness of using supporting tools for testing software and hardware DST (In Russian). Inf. Secur. Quest. 2, 9–13 (2017)

    Google Scholar 

  9. VMware Workstation Documentation Center. Use Unity Mode. https://pubs.vmware.com/workstation-9/index.jsp. Last accessed 27 June 2019

  10. Oracle VM VirtualBox User Manual. Seamless windows. https://www.virtualbox.org/manual/ch04.html#seamlesswindows. Last accessed 27 June 2019

  11. Parallels Desktop User’s Guide. Working in Coherence. http://download.parallels.com/desktop/v4/docs/en/Parallels_Desktop_Users_Guide/23413.htm. Last accessed 27 June 2019

  12. Kanner, A.M., Kanner, T.M.: Applying a mathematical approach to interpreting the results of testing software and hardware data security tools during the verification process. J. Eng. Appl. Sci. 14(10), 3482–3491 (2019)

    Google Scholar 

  13. Kanner, T.M.: Adaptation of existing verification methods for software and hardware DST (In Russian). Inf. Secur. Quest. 1, 13–19 (2018)

    Google Scholar 

  14. Kanner, A.M., Ukhlinov, L.M.: Access control in GNU/Linux (in Russian). Inf. Secur. Quest. 3, 35–38 (2012)

    Google Scholar 

  15. Kanner, A.M.: Correctness of data security tools for protection against unauthorized access and their interaction in GNU/Linux. Glob. J. Pure Appl. Math. 12(3), 2479–2501 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. M. Kanner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Epishkina, A.V., Kanner, A.M., Kanner, T.M. (2020). Comprehensive Testing of Software and Hardware Data Security Tools Using Virtualization. In: Misyurin, S., Arakelian, V., Avetisyan, A. (eds) Advanced Technologies in Robotics and Intelligent Systems. Mechanisms and Machine Science, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-33491-8_9

Download citation

Publish with us

Policies and ethics