Hardware virtualization technology and its security

Size: px
Start display at page:

Download "Hardware virtualization technology and its security"

Transcription

1 Hardware virtualization technology and its security Dr. Qingni Shen Peking University Intel UPO Supported

2 Main Points VMM technology Intel VT technology Security analysis of Intel VT-d

3 Virtual Machine Monitors (VMMs) VM 0 App 0 VM 1 App 1 VM n App n Virtual Machines (VMs)... Guest OS 0 Guest OS 1 Virtual Machine Monitor (VMM) Guest OS n Platform HW Memory Processor/CS I/O Devices VMM is a software layer Allow many virtual machine to share hardware Allow unmodified software directly compatible

4 Purpose of Virtualization Workload Isolation Workload Consolidation App 1 App 2 App 1 App 2 App 1 App 2 App 1 App 2 OS OS OS OS 1 OS 2 OS 1 OS 2 HW VMM HW 1 HW 2 VMM HW HW Workload Migration Workload Embedding App App App App OS OS OS 1 OS 2 VMM HW 1 VMM VMM VMM VMM HW 2 HW 1 HW 2 HW Virtualization has powerful capabilities

5 SERVER CLIENT Virtualization Usage Models Legacy software support Test The active partition Manageable Consolidation Consolidation Isolation Isolation Migration Embedding Server consolidation Failure recovery architecture High elastic data center Manageable Consolidation Migration Migration Isolation Migration Embedding

6 What is Intel VT technology Formerly known by the codenames Vanderpool* & Silvervale* VT is a collection of a series of hardware enhanced components VT is designed to simplify the virtualization software VT brings a new value, and various opportunities VT-x and VT-i the first VT series products implement on Intel processor and chip set. VT-x for IA-32 CPU virtualization enhancement VT-i for IPF CPU virtualization enhancement

7 Main components of Intel-VT Intel-VT technology, which is designed by Intel corporation, is a solution of hardware assisted virtualization. Including: VT-x/VT-i for CPU VT-d for chip set VT-c for network

8 Core function of VT-x/VT-i Intel flexible priority technology (Intel VT FlexPriority) Intel VT flexible migration technology (Intel VT FlexMigration) Intel VT extended page table (Extended Page Tables)

9 Intel VT FlexPriority When the processor executes the task,it will receive request or Interruption command which needs to pay attention to and produced by other devices or applications. In order to minimize the impact on performance, a special register within the processor will monitor the task priority. Thus, only a higher priority than the currently running task interruption will be timely focused. Intel FlexPriority can create a virtual copy of TPR6,which can be read, and can be modified by guest os without any intervention in some cases. This measure can make a significant performance improvement in 32 bit OS which uses TPR frequently.( For instance,the performance of application in Windows Server* 2000 will be improved by 35%.)

10 Intel VT FlexMigration An important advantage of virtualization is that in no downtime condition, running applications can be migrated between physical machines. The aim of Intel VT FlexMigration is to achieve the seamless migration between current server and future server which are based on Intel processor, even if the new system may include enhanced instruction set. With the help of this technology, management process can create a set of consistent instructions in all servers in migration pool, realizing seamless migration of workload. This generates a more flexible and unified server resource pool which can run seamlessly among generations of hardware.

11 Challenge of development of VMM OS and applications should not know that they are sharing CPU resources with others VM 0 App App... App Guest OS 0 VM Monitor Platform Hardware... VM 1 App App... Guest OS 1 App VMM should be able to make software stack in VM mutually independent VMM should be able to protect themselves from other client software threat VMM should be able to provide virtual hardware platform interface to guest software

12 Software solution: Client degradation Sensitive instruction will go wrong when run Guest OS in ring 0 and above Run VMM in VMM to handle errors during Guest OS operation VM 0 App Guest OS 0... VM 1 App... App App App... App Guest OS 1 Virtual hole of IA architecture: Ring level rename Non-trap instruction Out of bound error I interruption virtualization Context switching of CPU state Address space compression VM Monitor Platform Hardware Complex software skills Source code modification Binary code modification CPU virtualization of current IA architecture requires complex software design.

13 Intel Virtualization Technology VM 0 App VM 1 App... App App App... App Guest OS 0... Guest OS 1 Guest software runs in the new model, and the privilege is down; Applications still run in ring 3 OS runs in degraded privilege ring 0 VMM runs in a new model with all privileges VM Monitor Platform Hardware VMM is able to execute privilege instructions before guest software VT removes the design of virtualization hole and complex software

14 An overview of VT-x Operation Mode Guest OS VMM transition VM control structure Virtual-machine control structure Principle of VM exit Benefits

15 VMX root mode: Operation mode Own all privileges for the operation of the VMM VMX non-root mode: Own a subset of privileges for running guest softwares Rely on the ring level to reduce guest and software privileges With the help of renaming the ring and compression

16 VMX operation mode Root operation mode VMM is running in the root operation mode Non- root operation mode Guest software is running in the non-root operation mode

17 VM Entry From VMM into Guest VM Entry and VM Exit Fetch VM state from VMCS,and enter in non-root mode VMLAUNCH instruction is used to initialize the entry VMRESUME is used to re-enter the virtual machine state VM Exit From Guest into VMM Enters VMX root mode Place guest state into VMCS Import VMM state from VMCS VM 0 App App... App... Guest OS 0 VM Exit VM Entry Physical Host Hardware VM 1 App App... App Guest OS 1 VM Monitor

18 VT-x Operation IA-32 Operation Ring 3 Ring 0

19 VT-x Operation VMX Root Operation Ring 3 Ring 0 VMXON

20 VT-x Operation VM 1 VMX Ring 3 Non-root Operation Ring 0 VMX Root Operation Ring 3 Ring 0 VMLAUNCH

21 VT-x Operation VM 1 VMX Ring 3 Non-root Operation Ring 0 VM Exit VMX Root Operation Ring 3 Ring 0

22 VT-x Operation VM 1 VMX Ring 3 Non-root Operation Ring 0 VMX Root Operation Ring 3 Ring 0 VMRESUME

23 VMX Non-root Operation VT-x Operation VM 1 VM 2 Ring 3 Ring 3 Ring 0 Ring 0... VM n Ring 3 Ring 0 VMX Root Operation Ring 3 Ring 0 VMLAUNCH

24 VMX Non-root Operation VT-x Operation VM 1 VM 2 Ring 3 Ring 3 Ring 0 Ring 0... VM n Ring 3 Ring 0 VMCS1 VMCS2 VMCSn VMX Root Operation Ring 3 Ring 0

25 Virtual Machine Control Structure (VMCS) VMCSs is control structure stored in the memory Only one VMCS is active every time VMCS Payload: VM execution,exit,entry control Guest and host state VM exits information field VMCS currently has no uniform standard, so different designs may have different definitions VMPTRLD: a pointer pointing to VMCS VMREAD/VMWRITE: new VMCS access instructions

26 Virtual machine control structure (VMCS) In the view of VMX operation,intel defines VMCS. This structure can only be operated by VMCLEAR, VMPTRLD, VMREAD, and VMWRITE a) GUEST-STATE domain:state of processor when VM changes from root mode to non-root mode; b) HOST-STATE domain:state of processor when VM changes from non-root mode to root mode ; c) VM execution control domain : Processor is forced to exit from non-root operation mode to root operation mode if VM is running in non-root operation mode. d) VM exit control domain:store information f VM exits from non-root operation mode. e) VM entry control domain:read information if VM enters into non-root operation mode. f) VM exit information domain:save the reason into domain if VM exits from non-root operation mode to root operation mode.

27 Reasons of VM EXIT Exit paging state to operate on the page table Access CR3, INVLPG instruction(control TLB disabled) Page error CR0/CR4 access Some states need virtualization CPUID, RDMSR, WRMSR, RDPMC, RDTSC, MOV DRx Exception and I/O access 32-entry exception bitmap, I/O-port access bitmap Control of the asynchronous events When guest interrupt blocks, VMM should handle this situation Detect guest states in order to facilitate VM scheduling HLT, MWAIT, PAUSE

28 Benefits: VT helps improve VMMs VT reduces the guest OS s dependency No need for binary package or translation Provide support for legacy system VT improves robustness No need for complex software technology Simplified Smaller Trusted Compute Base (TCB) VT improves performance Fewer switching between VM and VMM

29 Device Virtualization (VT-d) As for server, I/O is an important component. The improvement of CPU computing ability can lead to faster data processing, only with the premise of the smooth arrival of data to CPU. As a result, whether the storage or the network, as well as the graphic cards, memory, and so on, I/O capability is an critical part of enterpriselevel architecture. Without VT-d technology, VMM must be involved in the interaction with I/O directly, which will not only slows down the speed of data transmission, but also increases processor s workload due to frequent VMM activities. VT-d provides direct access to real hardware mechanism for guest OS, which greatly reduces server processor s workload.

30 Current way of virtualization Simulate the I/O device:vmm simulates an I/O device for the guest so that the guest can make use of the corresponding real drivers through fully simulating devices functionality. This approach can provide perfect compatibility (regardless of the fact that whether this device exists or not), but this simulation will affect performance apparently. Additional software interface : This mode is more like I/O simulation model. VMM software will provide a series of direct device interface to VM, so as to enhance the efficiency of virtualization. This is a bit like the DirectX technology of Windows OS, which offers better performance than I/O simulation model, but decreases the capability.

31 Simulate the I/O device

32 Additional software interface

33 Design of VT-d The key to I/O virtualization is to solve the problem of DMA and IRQ interrupt request. Intel VT-d technology is based on hardware-assisted virtualization technology of North Bridge. The DMA virtualization hardware and IRQ virtualization hardware, built in the North Bridge, greatly enhance the reliability, flexibility and performance of I/O. Traditional IOMMUs (I/O memory management units) distinguishes devices through the range of memory address. So it is easy to realize, but is not easy to implement DMA isolation. Therefore, VT-d realizes the existence of multiple DMA protected areas by updating the design of IOMMU architecture, and achieves DMA virtualization eventually. It is also called DMA Remapping.

34 I/O device will generate many interrupt requests, so the I/O virtualization must separate these requests correctly, and routes them to different virtual machines. Traditional devices have two kinds of interrupt requests: One way is through I/O interrupt controller router, and the other way is through MSI(message signaled interrupts) which is sent by DMA write request directly. Due to the need to embed the target memory address into DMA request, this architecture requires fully access all the memory addresses, without realizing interrupt isolation. VT-d s interrupt-remapping architecture solves this problem by redefining MSI format. The new MSI is still in the form of a DMA write request, but does not embed the target memory address, and replaces with a message ID instead. Hardware can identify different VM domains through different message IDs by maintaining a table structure. The interrupt-remapping architecture implemented by VT-d is able to support all I/O resources, including IOAPICs, and all types of interrupt, such as common MSI and extended MSI-X.

35 DMA Remapping DMA remapping can provide hardware isolation for devices to access the memory. Through different I/O page tables, every device will be assigned to a specific domain. When the device attempts to access the system memory, DMA intercepts the access, decides whether to allow the access, and determines the real address location simultaneously. When the I/O table data structure is used frequently, it will be cached. DMA remapping mechanism can be configured independently by every device.

36 Interrupt Remapping Interrupt remapping provides the functions of remapping and routing the interrupt requests from I/O devices.

37 New design of IOMMU IOMMU manages device access to system memory. It locates between the peripheral devices and the host, and translates the address of device request to system memory address, and also checks the appropriate permission for each access. With IOMMU, every device can be assigned to a protection domain, which defines that the I/O page translation will be used in every device of the domain, and reveals the read privilege of every I/O page. As to virtualization, VMM can specify all devices to a specific guest OS environment in the same protected domain, which will create a series of address translation and access restrict for devices running on specific guest OS.

38 Two kinds of new device virtualization based on VT-d Direct assignment of I/O device:physical I/O device is directly assigned to VM. In this model, drivers inside the VM will directly communicate with hardware devices, only through a small amount or without the management of VMM. For the sake of system s robustness, hardware virtualization is needed to isolate and protect hardware resources only for specified VM to use. In the meanwhile, hardware also needs to possess multiple I/O container partitions for multiple VMs simultaneously. This model almost eliminates the need of running drivers in VMM completely. Such as CPU,although it is not an I/O device in common sense, it is surely in this way allocated to VM, while the CPU resources are still under the management of VMM. Shared I/O device: This model is an extension of the I/O assignment model, and has a high requirement that needs to support multiple function interfaces, and each interface can be assigned to a VM independently. This model will no doubt provide very high virtualization performance.

39

40 Network Virtualization (VT-c) Intel VT-c can further optimize network for virtualization. Essentially, the function of this set of technology combination is similar with post office: categorize all the received letters, packages and envelopes, and deliver them to their respective destinations. Intel VT-c significantly increases the speed of delivery, and reduces the workload of VMM and server processor through these functions implementing in private network chips. VT-c includes: Virtual Machine Device Queue (VMDq) Virtual Machine Direct Connection (VMDc)

41 VMDq In traditional server virtualization environment, VMM must categorize every individual data packet, and deliver it to its assigned VM, which will take up a lot of processor cycles. And with VMDq, this function can be performed by specified hardware within Intel server network card, and VMM is only responsible to deliver presort data packet group to appropriate guest OS. This will slow down I/O latency, and gain more available cycles for processor to deal with business applications. I/O throughput can be more than doubled by Intel VT-c, so that virtualized applications are able to reach the level of the host throughput. Every server will integrate more applications, while I/O bottlenecks will be less.

42 Network virtualization model Currently, all the VM softwares with network capabilities have built-in virtual switches, a majority of which provide the function of router on that basis. Their aim is to connect multiple virtual machines together into one or more networks, like the effect of real switch or router.

43 General network virtualization model

44 Structure of VMDq VMDq technology provides a classification/sorting engine, belonging to the second layer of ISO OSI 7-layer model, realizes part of the functions of the switch. In order to offer a suitable performance, it must use a stack buffer queue, therefore the network card that supports VMDq will also supports RSS receiver s extended function. A layer 2 classification/sorting device is realized by a hardware on the network card that supports VMDq, which through the MAC address or VLAN to send packets to specified VM queue(this queue is called pool). VMM software that completes virtual switch task only requires simple data replication in the final. Thus it greatly improve the efficiency of the virtual network. Network card that supports VMDq queue usually supports RSS queue. For example, Intel 82576EB network card supports 8 VM queues, and 16 RSS queues. The are essentially 16 send/receive queue pairs, which means every VM can be assigned two pairs.

45 Diagram of VMDq Acceleration Structure Make use of hardware to accomplish the work of certain soft routing.

46 Virtual Machine Direct Connection( VMDc ) With the aid of single root I/O virtualization (SR-IOV) standard in PCI-SI, VM direct connection (VMDc) supports VM s direct access to network I/O hardware, and thus improves the performance significantly. As it is mentioned before, Intel VT-d supports direct communication channel between guest OS and I/O port. SR-IOV can be extended by supporting each I/O port s multiple communication channels. For example,each of the 10 guest OSes can be assigned a protected and 1Gb/s private link by the mean of a single Intel 10 Gigabit server network card. These links bypass the VMM switch,and can further enhance I/O in performance and reduce workload of server processors.

47 Security Analysis of VT-d Hardware virtualization solves the security problem of virtual system, and provides a better isolation solution in system hardware resources. But the hardware system is complicated, so there are still some security problems to be solved. In the meantime, a few attackers have discovered some loopholes in hardware virtualization.

48 Attack Scenario Assume such a virtual system, which builds a driver domain with the aid of the Intel VT-d technology. Driver domains are similar to traditional VMs, but they are assigned the privileges of choosing devices such as network card, disk controller etc. We can attempt to get the complete control of the whole system by the mean of such a deriver domain. In this attack scenario, we suppose that attackers have managed to get a full control of a certain driver domain.

49 Diagram

50 MSI( Message Signaled Interrupts ) MSI Format(From Intel developer manual ): All the three attacks, which will be mentioned later, make use of I/O devices to generate the MSI, so as to realize the attack.

51 1)Threat based on SIPI Construction SIPI ( Start-up Inter Processor Interrupt ) interrupt is a key function of any multiprocessor (or multi-core) system based on Intel processor. BIOS uses SIPI interrupt to initialize all processers and distribute tasks to them at startup. When system starts, only one processor, called Bootstrap processor or BSP, is active, and its job is to initialize other processors to make them work properly.

52 SIPI interrupt informs target processor to start to execute special boot code at the address 0xvv000. While VV is passed by SIPI interrupt vector. In order to make SIPI effective, target CPU must be sent a INIT interrupt firstly, which will reset CPU to enter the wait-for-sipi state. BSP sends SIPI interrupts to all other processors under normal circumstances. The only mechanism of sending SIPI interrupt is through the local advanced programmable interrupt controller.

53 SIPI 格 式 ( 摘 自 Intel 开 发 人 员 手 册 ):

54 Diagram of Attack

55 2)System call injection attack CPU#0 CPU#1 CPU#2 NIC 0x82h Hypervisor hypercall Driver Domain Dom0

56 3)#AC-based injection attack #AC can be tried to confuse the stack layout of exception handler. #AC exception is the only exception that meets the following two requirements: The vector value is greater than 15, so that it can be distributed by MSI; It is the only one that can be interpreted as exception, without storage error codes.

57 LOW Normal distribution of #AC exception HIG H ErrorCode RIP CS RFLAGS RSP SS Storage exception code

58 The #AC handler will be triggered to execute on target CPU if the MSI, with a vector value 0x11(# AC), is distributed from some devices. Because handler is expected to place error codes on the top of the stack, so it will go wrong when resolve other values on the stack. In this case, CS may be revolved to RIP, and RFLAGS will be treated as CS and so on. When an exception handler ends, it will execute IRET instruction to popup saved register values, and jumps back to CS:RIP, which means that handler will return to RFLAGS:CS actually

59 Mapping

60 Bibliography 1. Hiremane, R. (2007). "Intel virtualization technology for directed i/o (intel vt-d)." Intel Magazine 4(10). 2. Neiger, G., et al. (2006). "Intel virtualization technology: Hardware support for efficient processor virtualization." Intel Technology Journal 10(3): Uhlig, R., et al. (2005). "Intel virtualization technology." Computer 38(5): Adams, K. and O. Agesen (2006). A comparison of software and hardware techniques for x86 virtualization. ACM SIGOPS Operating Systems Review, ACM. 5. Zhang, X. and Y. Dong (2008). Optimizing Xen VMM Based on Intel Virtualization Technology. Internet Computing in Science and Engineering, ICICSE'08. International Conference on, IEEE. 6. Perez, R., et al. (2008). "Virtualization and hardware-based security." Security & Privacy, IEEE 6(5): De Gelas, J. and I. ESX (2008). "Hardware Virtualization: the Nuts and Bolts." AnandTech. Retrieved March 17: 2008.

61 Intel UPO Supported

Intel Virtualization Technology Overview Yu Ke

Intel Virtualization Technology Overview Yu Ke Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)

More information

Nested Virtualization

Nested Virtualization Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization

More information

A Superior Hardware Platform for Server Virtualization

A Superior Hardware Platform for Server Virtualization A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations

More information

Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006

Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Rich Uhlig, et.al, Intel Virtualization Technology, Computer, published by the IEEE Computer Society, Volume 38, Issue 5, May 2005. Pages 48 56. Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Outline of

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

Intel Virtualization Technology (VT) in Converged Application Platforms

Intel Virtualization Technology (VT) in Converged Application Platforms Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January

More information

CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013

CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013 CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Chapter 5 Cloud Resource Virtualization

Chapter 5 Cloud Resource Virtualization Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.

More information

Hardware Assisted Virtualization Intel Virtualization Technology

Hardware Assisted Virtualization Intel Virtualization Technology Hardware Assisted Virtualization Intel Virtualization Technology Matías Zabaljáuregui matiasz@info.unlp.edu.ar Buenos Aires, Junio de 2008 1 Index 1 Background, motivation and introduction to Intel Virtualization

More information

Virtualization in Linux KVM + QEMU

Virtualization in Linux KVM + QEMU CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization

More information

Intel Virtualization Technology Specification for the IA-32 Intel Architecture

Intel Virtualization Technology Specification for the IA-32 Intel Architecture Intel Virtualization Technology Specification for the IA-32 Intel Architecture C97063-002 April 2005 THIS DOCUMENT AND RELATED MATERIALS AND INFORMATION ARE PROVIDED AS IS WITH NO WARRANTIES, EXPRESS OR

More information

Intel Vanderpool Technology for IA-32 Processors (VT-x) Preliminary Specification

Intel Vanderpool Technology for IA-32 Processors (VT-x) Preliminary Specification Intel Vanderpool Technology for IA-32 Processors (VT-x) Preliminary Specification Order Number C97063-001 January 2005 THIS DOCUMENT AND RELATED MATERIALS AND INFORMATION ARE PROVIDED "AS IS" WITH NO WARRANTIES,

More information

Intel Virtualization Technology and Extensions

Intel Virtualization Technology and Extensions Intel Virtualization Technology and Extensions Rochester Institute of Technology Prepared and Presented by: Swapnil S. Jadhav (Computer Engineering) Chaitanya Gadiyam (Computer Engineering) 1 Agenda Virtualization

More information

matasano Hardware Virtualization Rootkits Dino A. Dai Zovi

matasano Hardware Virtualization Rootkits Dino A. Dai Zovi Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

Hybrid Virtualization The Next Generation of XenLinux

Hybrid Virtualization The Next Generation of XenLinux Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Intel Virtualization Technology Processor Virtualization Extensions and Intel Trusted execution Technology

Intel Virtualization Technology Processor Virtualization Extensions and Intel Trusted execution Technology Intel Virtualization Technology Processor Virtualization Extensions and Intel Trusted execution Technology Gideon Gerzon Senior Processor Architect, Intel Mobile Group 1 Agenda Virtualization Basics Emerging

More information

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. ! Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

Reducing Cost and Complexity with Industrial System Consolidation

Reducing Cost and Complexity with Industrial System Consolidation WHITE PAPER Multi- Virtualization Technology Industrial Automation Reducing Cost and Complexity with Industrial System Consolidation Virtualization on multi-core Intel vpro processors helps lower overall

More information

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines

More information

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This

More information

Intel Virtualization Technology

Intel Virtualization Technology Intel Virtualization Technology Examining VT-x and VT-d August, 2007 v 1.0 Peter Carlston, Platform Architect Embedded & Communications Processor Division Intel, the Intel logo, Pentium, and VTune are

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach Sponsored by: Intel John Humphreys June 2006 Tim Grieser IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200

More information

Virtualization Technology. Zhiming Shen

Virtualization Technology. Zhiming Shen Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became

More information

Brian Walters. 1999. VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999).

Brian Walters. 1999. VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999). Implements BIOS emulation support for BHyVe: A BSD Hypervisor Abstract Current BHyVe only supports FreeBSD/amd6 as a GuestOS. One of the reason why BHyVe cannot support other OSes is lack of BIOS support.

More information

Hypervisors and Virtual Machines

Hypervisors and Virtual Machines Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,

More information

Enabling Intel Virtualization Technology Features and Benefits

Enabling Intel Virtualization Technology Features and Benefits WHITE PAPER Intel Virtualization Technology Enterprise Server Enabling Intel Virtualization Technology Features and Benefits Maximizing the benefits of virtualization with Intel s new CPUs and chipsets

More information

FRONT FLYLEAF PAGE. This page has been intentionally left blank

FRONT FLYLEAF PAGE. This page has been intentionally left blank FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to

More information

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation

More information

Virtual Machines. Virtual Machine (VM) Examples of Virtual Systems. Types of Virtual Machine

Virtual Machines. Virtual Machine (VM) Examples of Virtual Systems. Types of Virtual Machine 1 Virtual Machines Virtual Machine (VM) Layered model of computation Software and hardware divided into logical layers Layer n Receives services from server layer n 1 Provides services to client layer

More information

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms

More information

Virtual machines and operating systems

Virtual machines and operating systems V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota lichota@mimuw.edu.pl A g e n d a Virtual machines and operating systems interactions

More information

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Hardware Based Virtualization Technologies Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization

More information

Cloud Computing CS 15-319

Cloud Computing CS 15-319 Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization

More information

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization... Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

The Microsoft Windows Hypervisor High Level Architecture

The Microsoft Windows Hypervisor High Level Architecture The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its

More information

Virtualization. 2010 VMware Inc. All rights reserved

Virtualization. 2010 VMware Inc. All rights reserved Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D. Rodgers Intel Virtualization Technology

More information

Introduction to Virtualization

Introduction to Virtualization Introduction to Virtualization Dr. Qingni Shen Peking University Intel UPO Supported Main Points Status and trends in data center Definition of virtualization Common types of virtualization Key technologies

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

Enterprise-Class Virtualization with Open Source Technologies

Enterprise-Class Virtualization with Open Source Technologies Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single

More information

Knut Omang Ifi/Oracle 19 Oct, 2015

Knut Omang Ifi/Oracle 19 Oct, 2015 Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What

More information

EE282 Lecture 11 Virtualization & Datacenter Introduction

EE282 Lecture 11 Virtualization & Datacenter Introduction EE282 Lecture 11 Virtualization & Datacenter Introduction Christos(Kozyrakis( ( h.p://ee282.stanford.edu( EE282$ $Spring$2013$ $Lecture$11$ Announcements Project 1 is due on 5/8 th HW2 is due on 5/20 th

More information

Intel Trusted Platforms Overview

Intel Trusted Platforms Overview Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

PCI-SIG SR-IOV Primer. An Introduction to SR-IOV Technology Intel LAN Access Division

PCI-SIG SR-IOV Primer. An Introduction to SR-IOV Technology Intel LAN Access Division PCI-SIG SR-IOV Primer An Introduction to SR-IOV Technology Intel LAN Access Division 321211-002 Revision 2.5 Legal NFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intel Virtualization Technology FlexMigration Application Note

Intel Virtualization Technology FlexMigration Application Note Intel Virtualization Technology FlexMigration Application Note This document is intended only for VMM or hypervisor software developers and not for application developers or end-customers. Readers are

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

x86 Virtualization Hardware Support Pla$orm Virtualiza.on

x86 Virtualization Hardware Support Pla$orm Virtualiza.on x86 Virtualization Hardware Support Pla$orm Virtualiza.on Hide the physical characteris.cs of computer resources from the applica.ons Not a new idea: IBM s CP- 40 1967, CP/CMS, VM Full Virtualiza.on Simulate

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 2 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the

More information

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1. Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*

More information

asdc Introduction to Virtualization Technology Argentina Software Development Center Software and Solutions Group Gisela Giusti October 11, 2007

asdc Introduction to Virtualization Technology Argentina Software Development Center Software and Solutions Group Gisela Giusti October 11, 2007 Introduction to Virtualization Technology Argentina Software Development Center Software and Solutions Group Gisela Giusti October 11, 2007 asdc Argentina Software Development Center Software @ Intel 50+

More information

NoHype: Virtualized Cloud Infrastructure without the Virtualization

NoHype: Virtualized Cloud Infrastructure without the Virtualization NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee Princeton University ISCA 2010 Virtualized Cloud Infrastructure Run virtual machines

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

Kernel Virtual Machine

Kernel Virtual Machine Kernel Virtual Machine Shashank Rachamalla Indian Institute of Technology Dept. of Computer Science November 24, 2011 Abstract KVM(Kernel-based Virtual Machine) is a full virtualization solution for x86

More information

Nested Virtualization

Nested Virtualization Nested Virtualization State of the art and future directions Bandan Das Yang Z Zhang Jan Kiszka 2 Outline Introduction Changes and Missing Features for AMD Changes and Missing Features for Intel Working

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

Virtual Machine Security

Virtual Machine Security Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal

More information

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Microkernels, virtualization, exokernels. Tutorial 1 CSC469 Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,

More information

Attacking Hypervisors via Firmware and Hardware

Attacking Hypervisors via Firmware and Hardware Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor

More information

Security of Cloud Computing

Security of Cloud Computing Security of Cloud Computing Fabrizio Baiardi f.baiardi@unipi.it 1 Syllabus Cloud Computing Introduction Security Supporting Technologies Virtualization Technology Scalable Computing = Elasticity Security

More information

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University Virtualization Technology Zhonghong Ou Data Communications Software Lab, Aalto University 1 Definition Virtualization refers to a concept in which access to a single underlying piece of hardware, like

More information

Attacking Hypervisors via Firmware and Hardware

Attacking Hypervisors via Firmware and Hardware Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research Agenda Hypervisor based isolation Firmware rootkit

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

Virtualization Technologies

Virtualization Technologies 12 January 2010 Virtualization Technologies Alex Landau (lalex@il.ibm.com) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating

More information

Virtualizing a computing system s physical

Virtualizing a computing system s physical COVER FEATURE Intel Virtualization Technology Once confined to specialized server and mainframe systems, virtualization is now supported in off-the-shelf systems based on Intel architecture hardware. Intel

More information

Simplify VMware vsphere* 4 Networking with Intel Ethernet 10 Gigabit Server Adapters

Simplify VMware vsphere* 4 Networking with Intel Ethernet 10 Gigabit Server Adapters WHITE PAPER Intel Ethernet 10 Gigabit Server Adapters vsphere* 4 Simplify vsphere* 4 Networking with Intel Ethernet 10 Gigabit Server Adapters Today s Intel Ethernet 10 Gigabit Server Adapters can greatly

More information

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation

More information

Chapter 14 Virtual Machines

Chapter 14 Virtual Machines Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously

More information

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Introduction Virtualization: Providing an interface to software that maps to some underlying system. A one-to-one mapping between a guest

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13 Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

How To Create A Cloud Based System For Aaas (Networking)

How To Create A Cloud Based System For Aaas (Networking) 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

Advanced Computer Networks. Network I/O Virtualization

Advanced Computer Networks. Network I/O Virtualization Advanced Computer Networks 263 3501 00 Network I/O Virtualization Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week: Today: Software Defined

More information

Virtualization. Explain how today s virtualization movement is actually a reinvention

Virtualization. Explain how today s virtualization movement is actually a reinvention Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.

More information

Extending Xen* with Intel Virtualization Technology

Extending Xen* with Intel Virtualization Technology Extending Xen* with Intel Virtualization Technology Yaozu Dong, Core Software Division, Intel Corporation Shaofan Li, Core Software Division, Intel Corporation Asit Mallick, Core Software Division, Intel

More information

BHyVe. BSD Hypervisor. Neel Natu Peter Grehan

BHyVe. BSD Hypervisor. Neel Natu Peter Grehan BHyVe BSD Hypervisor Neel Natu Peter Grehan 1 Introduction BHyVe stands for BSD Hypervisor Pronounced like beehive Type 2 Hypervisor (aka hosted hypervisor) FreeBSD is the Host OS Availability NetApp is

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

Compromise-as-a-Service

Compromise-as-a-Service ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Broadcom Ethernet Network Controller Enhanced Virtualization Functionality A Dell Technical White Paper Third party information brought to you, courtesy of Dell. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES

More information

evm Virtualization Platform for Windows

evm Virtualization Platform for Windows B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400

More information

An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management

An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource

More information

AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI -

AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI - AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI - Tatsuya TAKEHISA, Hiroki NOGAWA, and Masakatu MORII Abstract. In this paper, we propose a method

More information

SR-IOV Networking in Xen: Architecture, Design and Implementation Yaozu Dong, Zhao Yu and Greg Rose

SR-IOV Networking in Xen: Architecture, Design and Implementation Yaozu Dong, Zhao Yu and Greg Rose SR-IOV Networking in Xen: Architecture, Design and Implementation Yaozu Dong, Zhao Yu and Greg Rose Abstract. SR-IOV capable network devices offer the benefits of direct I/O throughput and reduced CPU

More information

The NOVA Microhypervisor

The NOVA Microhypervisor The NOVA Microhypervisor Germany Microprocessor Lab, Intel Labs Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL

More information

The Turtles Project: Design and Implementation of Nested Virtualization

The Turtles Project: Design and Implementation of Nested Virtualization The Turtles Project: Design and Implementation of Nested Virtualization Muli Ben-Yehuda Michael D. Day Zvi Dubitzky Michael Factor Nadav Har El muli@il.ibm.com mdday@us.ibm.com dubi@il.ibm.com factor@il.ibm.com

More information

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;

More information