Taming Hosted Hypervisors with (Mostly) Deprivileged Execution
|
|
|
- Patience Cunningham
- 10 years ago
- Views:
Transcription
1 Taming Hosted Hypervisors with (Mostly) Deprivileged Execution Chiachih Wu, Zhi Wang *, Xuxian Jiang North Carolina State University, * Florida State University
2 Virtualization is Widely Used 2 There are now hundreds of thousands of companies around the world using AWS to run all their business, or at least a portion of it. They are located across 190 countries, which is just about all of them on Earth. Werner Vogels, CTO at Amazon AWS Summit 12 Virtualization penetration has surpassed 50% of all server workloads, and continues to grow. Magic Quadrant for x86 Server Virtualization Infrastructure June 12
3 Threats to Hypervisors 3 Large Code Bases Hypervisor Xen (4.0) VMware ESXi 1 Hyper-V 1 SLOC 194K 200K 100K KVM ( ) 33.6K 1: Data source: NOVA (Steinberg et al., EuroSys 10) Vulnerabilities Hypervisor Vulnerabilities Xen 41 KVM 24 VMware ESXi 43 VMware Workstation 49 Data source: National Vulnerability Database ( 09~ 12)
4 Threats to Hosted Hypervisors 4 Applications Applications Guest OS Guest OS Hypervisor Host OS Physical Hardware Can we prevent the compromised hypervisor from attacking the rest of the system?
5 DeHype 5 Decomposing the KVM hypervisor codebase De-privileged part user-level (93.2% codebase) Privileged part small kernel module (2.3 KSLOC) Guest VM Applications Applications Applications Applications Guest OS Guest OS Guest OS Guest OS De-privilege DeHyped KVM DeHyped KVM KVM Host OS HypeLet Host OS ~4% overhead Physical Hardware Physical Hardware
6 Challenges 6 Providing the OS services in user mode Minimizing performance overhead Supporting hardware-assisted memory virtualization at user-level
7 Challenge I 7 Providing the OS services in user mode De-privileged Hypervisor Hypervisor User Kernel Hypervisor HypeLet Host OS Physical Hardware Host OS Physical Hardware Original Hosted Hypervisor DeHype d Hosted Hypervisor
8 Dependency Decoupling 8 Abstracting the host OS interface and providing OS functionalities in user mode For example Memory allocator: kmalloc/kfree, alloc_page, etc. Kernel APIs for memory access: virt_to_page, etc. Scheduling, signal handling, invoking system calls Leveraging GLIBC
9 Dependency Decoupling 9 Name VMREAD VMWRITE GUEST_RUN GUEST_RUN_POST RDMSR WRMSR INVVPID INVEPT INIT_VCPU MAP_HVA_TO_PFH 10 privileged services provided by HypeLet Function Read VMCS fields Write VMCS fields Perform host-to-guest world switches Perform guest-to-host world switches Read MSR registers Write MSR registers Invalidate TLB mappings based on VPID Invalidate EPT mappings Initialize vcpu Translate host virtual address to physical frame Privileged instrustions Service routines
10 Challenge II 10 Minimizing performance overhead QEMU 1system call 1function call privileged instructions DeHyped KVM QEMU User Kernel HypeLet ~10% system calls Time
11 Optimization: Caching VMCS 11 VMCS (Virtual Machine Control Structure) ~90% of the privileged instructions issued by the hypervisor are for accessing VMCS Accessed by the hypervisor for monitoring or controlling the behavior of the guest VM Indirectly affected by the guest VM throughout the running period in guest mode
12 Optimization: Caching VMCS 12 Maintaining cached copy of VMCS in user-level Caching only the most frequently accessed fields Caching 8 VMWRITE d fields: 98.28% VMWRITE system calls reduced Top 8 Most Frequently VMWRITE d VMCS Fields CPU_BASED_VM_EXEC_CONTROL EPT_POINTER_HIGH EPT_POINTER GUEST_RIP VM_ENTRY_INTR_INFO_FIELD GUEST_RFLAGS GUEST_CR3 GUEST_RSP Caching 28 VMREAD d fields: 99.86% VMREAD system calls reduced
13 Challenge III 13 Supporting hardware-assisted memory virtualization at user-level Maintaining nested page tables which translate guest-physical to host-physical addresses Memory may be paged out Virtual-physical mapping information is unknown Preventing the untrusted hypervisors from accessing memory areas not belonged to them Bactch-processing NPT updates with sanity checks in HypeLet
14 Implementation and Evaluation 14 Prototype KVM with qemu-kvm ~93.2% of KVM codebase is de-privileged 2.3K SLOC small kernel module (HypeLet) Evaluation Security benefits Non-security benefits Performance
15 Testing real-world vulnerabilities 15 CVE Guest OS causing a NULL pointer dereference (accessing debug registers with MOV) in KVM running in privileged mode Guest VM Applications Applications Applications Applications Guest OS Guest OS Whole System Crashes Guest OS KVM Host OS Guest OS DeHype KVM HypeLet Host OS KVM Particular Instance of QEMU+KVM Crashes Only Physical Hardware Physical Hardware
16 Facilitating hypervisor development 16 e.g., debugging the NPT fault handler with GDB continue the program set breakpoint NPT fault occurs register dump call trace
17 Running multiple hypervisors 17 Running each hypervisor in a different security level Suspicious guests: running on VMI-enabled hypervisors Others: running on normal hypervisors Live-migrating guests to another hypervisor in the same host computer 1. New vulnerability reported and fixed 2. Starting a patched hypervisor 3. Live-migrating all guests one-by-one
18 Performance Evaluation 18 Test platform Dell OptiPlex 980: Intel Core i G RAM Host: Ubuntu desktop + Linux kernel Guests: Ubuntu LTS server Benchmarks Software Package Version Configuration SPEC CPU2006 v1.0.1 Reportable int Bonnie e bonnie++ -f -n 256 Linux kernel untar_kernel: tar zfx <KERNEL- TARBALL> make_kernel: make defconfig vmlinux
19 Relative Performance % 99% 98% 97% 96% 95% 94% 93% DeHype DeHype+VMCS caching DeHype+VMCS caching+securely NPT updates
20 Discussion 20 HypeLet and the host OS are a part of the TCB HypeLet is the main attack surface in the cloud environment HypeLet is highly constrained (2.3 KSLOC, 10 services) Prototype limitations Pinning guest memory Could be extended with Linux MMU notifier Not supporting all KVM features SMP Para-virtualized I/O
21 Related Work 21 Improving hypervisor security sel4 (Klein et al., SOSP 09), NOVA (Steinberg et al., EuroSys 10), HyperLock (Wang et al., EuroSys 12) Isolating untrusted device drivers Nooks (Swift et al., SOSP 03), Microdrivers (Ganapathy et al., ASPLOS 08) Applying virtualization to host security HookSafe (Wang et al., CCS 09), Lockdown (Vasudevan et al., TRUST 12)
22 Conclusion 22 DeHype substantially reduces hosted hypervisor s attack surface and brings additional benefits Better development and debugging Concurrent execution of multiple hypervisors Applications Applications Guest OS Guest OS 93.2% of original KVM DeHyped KVM HypeLet Host OS DeHyped KVM 2.3 KSLOC Physical Hardware
23 23 Thanks, Questions? Chiachih Wu
24 24 Backup Slides
25 Memory Rebasing 25 virtual physical u_addr 3. u_addr k_addr 2. Remapping the pinned memory to user space user kernel u_base k_addr 4. k_addr p_addr p_addr k_bas e 1. Pre-allocating pinned memory in kernel space
26 Securely Update NPT Entries 26 i Preventing the untrusted hypervisor from updating the NPT tables directly R Recording the update operations into buffer Batch-processing the updates in next host-toguest switch with sanity check (by HypeLet) Issue: the hypervisor needs the actual NPTs to traverse the layer-based NPTs j A k B l m C Update entry l 1. Allocate A; R[i]=A 2. Allocate B; A[j]=B 3. Allocate C; B[k]=C 4. Update C[l] Update entry m 1. A=R[i] 2. B=A[j] 3. C=B[k] 4. Update C[m] Cannot traverse Recording only
27 Pseudo NPT 27 Privileged Service Request Pseudo NPTs (allocated from heap) Host mode, User-level VM Entry i k R j A B C Real NPTs (allocated from the remapped memory pool) Time Buffer Allocate A; R[i]=A Allocate B; A[j]=B Allocate C; B[k]=C i R j A k B C Guest Mode Access Guest Host mode, Kernel-level
28 Intel VT-x: World Switches 28 VM Entry Transition from VMM to Guest (VMLAUNCH/VMRESUME) Enters VMX non-root operation (guest mode) Saves VMM state in VMCS Loads Guest state and exit criteria from VMCS VM Exit Transition from Guest to VMM (VMEXIT) Enters VMX root operation (host mode) Saves Guest state in VMCS Loads VMM state from VMCS Virtual Machine Applications Guest OS Virtual Machine Applications Guest OS VM Entry VM Exit Hypervisor Host OS Physical Hardware
29 Optimization: Caching VMCS 29 Top 28 Most Frequently VMREAD ed VMCS Fields GUEST_INTERRUPTIBILITY_INFO EXIT_QUALIFICATION GUEST_CS_BAS E IDT_VECTORING_INO_FIELD GUEST_PHYSICAL_ADDRESS_HI GH GUEST_PHYSICAL_ADDRESS VM_EXIT_INTR_INFO VM_EXIT_INSTRUCTION_LEN CPU_BASED_VM_EXEC_CONTRO L GUEST_CS_SELECT OR GUEST_CS_AR_BYTE S GUEST_PDPTR0_HIG H GUEST_PDPTR1_HIG H GUEST_PDPTR2_HIG H GUEST_PDPTR3_HIG H GUEST_DS_BAS E GUEST_ES_BAS E GUEST_PDPTR0 GUEST_PDPTR1 GUEST_PDPTR2 GUEST_PDPTR3 GUEST_RSP GUEST_RIP GUEST_CR0 GUEST_CR3 GUEST_CR4 GUEST_RFLAGS VM_EXIT_REASON
30 Combining privileged instructions 30 VMPTRLD: a privileged instruction to load guest states before switching to guest mode QEMU KVM_RUN DeHype d KVM VMPTRLD VMRESUME VMEXIT guest HypeLet VMRESUME VMEXIT guest User Kernel Time CPU intensive workload KVM handles most VM Exits One VMPTRLD is followed by multiple runs of (VMRESUME, VMEXIT) The latency of VMPTRLD is not significant
31 Combining privileged instructions 31 IO intensive workload QEMU handles most VM exits for issuing IO instructions One VMPTRLD is followed by one run of (VMRESUME, VMEXIT) VMPTRLD introduces significant latency QEMU KVM_RUN DeHype d KVM HypeLet VMPTRLD VMRESUME VMEXIT guest HypeLet VMPTRLD VMRESUME VMEXIT guest User Kernel Time Postponing the VMPTRLD instruction until the first VMRESUME instruction
32 Testing real-world vulnerabilities 32 CVE KVM attempting to interpret wrong-size (too long) instructions Being exploited Causing large latencies in non-preempt hosts With DeHype Instruction emulation is done in user-level where preemption is natively enabled
33 Testing real-world vulnerabilities 33 CVE KVM copying certain data structures to user program without clearing the padding Being exploited QEMU processes potentially obtaining sensitive information from kernel stack With DeHype QEMU process obtaining information from the stack of the hypervisor paired with it, not from the kernel stack
Virtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
Nested Virtualization
Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Isolating Commodity Hosted Hypervisors with HyperLock
Isolating Commodity Hosted Hypervisors with HyperLock Zhi Wang Chiachih Wu Michael Grace Xuxian Jiang Department of Computer Science North Carolina State University {zhi wang, cwu10, mcgrace}@ncsu.edu
Intel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
Hybrid Virtualization The Next Generation of XenLinux
Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Kernel Virtual Machine
Kernel Virtual Machine Shashank Rachamalla Indian Institute of Technology Dept. of Computer Science November 24, 2011 Abstract KVM(Kernel-based Virtual Machine) is a full virtualization solution for x86
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
Virtualization. 2010 VMware Inc. All rights reserved
Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D. Rodgers Intel Virtualization Technology
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
Brian Walters. 1999. VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999).
Implements BIOS emulation support for BHyVe: A BSD Hypervisor Abstract Current BHyVe only supports FreeBSD/amd6 as a GuestOS. One of the reason why BHyVe cannot support other OSes is lack of BIOS support.
Nested Virtualization
Nested Virtualization State of the art and future directions Bandan Das Yang Z Zhang Jan Kiszka 2 Outline Introduction Changes and Missing Features for AMD Changes and Missing Features for Intel Working
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
The Turtles Project: Design and Implementation of Nested Virtualization
The Turtles Project: Design and Implementation of Nested Virtualization Muli Ben-Yehuda Michael D. Day Zvi Dubitzky Michael Factor Nadav Har El [email protected] [email protected] [email protected] [email protected]
Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones ([email protected]) May 2011
Cloud^H^H^H^H^H Virtualization Technology Andrew Jones ([email protected]) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research Agenda Hypervisor based isolation Firmware rootkit
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Architecture of the Kernel-based Virtual Machine (KVM)
Corporate Technology Architecture of the Kernel-based Virtual Machine (KVM) Jan Kiszka, Siemens AG, CT T DE IT 1 Corporate Competence Center Embedded Linux [email protected] Copyright Siemens AG 2010.
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
The Xen of Virtualization
The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
The NOVA Microhypervisor
The NOVA Microhypervisor Germany Microprocessor Lab, Intel Labs Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Intel Virtualization Technology and Extensions
Intel Virtualization Technology and Extensions Rochester Institute of Technology Prepared and Presented by: Swapnil S. Jadhav (Computer Engineering) Chaitanya Gadiyam (Computer Engineering) 1 Agenda Virtualization
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
KVM Architecture Overview
KVM Architecture Overview 2015 Edition Stefan Hajnoczi 1 Introducing KVM virtualization KVM hypervisor runs virtual machines on Linux hosts Mature on x86, recent progress on ARM and
CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013
CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006
Rich Uhlig, et.al, Intel Virtualization Technology, Computer, published by the IEEE Computer Society, Volume 38, Issue 5, May 2005. Pages 48 56. Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Outline of
Nested Virtualization
Nested Virtualization Introduction and improvements Bandan Das Karen Noel 2 Outline Introduction When things don't work Note on AMD Speeding up Wrap-up References 3 Introduction Nested Virtualization Linux
Hypervisor Memory Forensics
Hypervisor Memory Forensics Mariano Graziano and Davide Balzarotti SANS DFIR EU SUMMIT October 2013 - Prague S3 GROUP S3 GROUP Actaeon Memory forensics of virtualization environments Locate any Intel Hardware
CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization
CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
Introduction to Virtualization & KVM
Introduction to Virtualization & KVM By Zahra Moezkarimi ICT Research Institute Software Platform Laboratory Outline Virtualization History Overview Advantages and Limitations Types of virtualization Virtualization
OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer
OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Introduction Virtualization: Providing an interface to software that maps to some underlying system. A one-to-one mapping between a guest
Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann
Cloud Computing Dipl.-Wirt.-Inform. Robert Neumann Pre-Cloud Provisioning Provisioned IT Capacity Load Forecast IT Capacity Overbuy Underbuy Fixed Cost for Capacity Investment Hurdle Real Load Time 144
Intel Virtualization Technology Processor Virtualization Extensions and Intel Trusted execution Technology
Intel Virtualization Technology Processor Virtualization Extensions and Intel Trusted execution Technology Gideon Gerzon Senior Processor Architect, Intel Mobile Group 1 Agenda Virtualization Basics Emerging
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
Survey On Hypervisors
Survey On Hypervisors Naveed Alam School Of Informatics and Computing Indiana University Bloomington [email protected] ABSTRACT Virtual machines are increasing in popularity and are being widely adopted.
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Privacy Protection in Virtualized Multi-tenant Cloud: Software and Hardware Approaches
Privacy Protection in Virtualized Multi-tenant Cloud: Software and Hardware Approaches Haibo Chen Institute of Parallel and Distributed Systems Shanghai Jiao Tong University http://ipads.se.sjtu.edu.cn/haibo_chen
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
Hardware virtualization technology and its security
Hardware virtualization technology and its security Dr. Qingni Shen Peking University Intel UPO Supported Main Points VMM technology Intel VT technology Security analysis of Intel VT-d Virtual Machine
Bare-Metal Performance for x86 Virtualization
Bare-Metal Performance for x86 Virtualization Muli Ben-Yehuda Technion & IBM Research Muli Ben-Yehuda (Technion & IBM Research) Bare-Metal Perf. for x86 Virtualization Intel, Haifa, 2012 1 / 49 Background:
Secure In-VM Monitoring Using Hardware Virtualization
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif Georgia Institute of Technology Atlanta, GA, USA [email protected] Wenke Lee Georgia Institute of Technology Atlanta, GA, USA [email protected]
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Platform Virtualization: Model, Challenges and Approaches
Platform Virtualization: Model, Challenges and Approaches Fangzhou Jiao, Yuan Luo School of Informatics and Computing Indiana University {fjiao, yuanluo}@indiana.edu Outlines Virtualization Overview Virtualization
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...
Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Performance Profiling in a Virtualized Environment
Performance Profiling in a Virtualized Environment Jiaqing Du EPFL, Switzerland Nipun Sehrawat IIT Guwahati, India Willy Zwaenepoel EPFL, Switzerland Abstract Virtualization is a key enabling technology
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Introduction to Virtual Machines
Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O
Clouds, Virtualization and Security or Look Out Below
Clouds, Virtualization and Security or Look Out Below Lee Badger Hardware Virtualization (Box View) 1 2 dom0 HW type 1 Para-virtualization I/O Host HW type 2 dom0 HW type 1 Full virtualization I/O Host
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY Syamsul Anuar Abd Nasir Fedora Ambassador Malaysia 1 ABOUT ME Technical Consultant for Warix Technologies - www.warix.my Warix is a Red Hat partner Offers
Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis William A. R. de Souza and Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill,
Tracing Kernel Virtual Machines (KVM) and Linux Containers (LXC)
Tracing Kernel Virtual Machines (KVM) and Linux Containers (LXC) École Polytechnique de Montréal Révolution Linux 25 juin 2010 Plan 1 Introduction Virtualization and Contextualization Technologies 2 Tracing
KVM: Kernel-based Virtualization Driver
KVM: Kernel-based Virtualization Driver White Paper Overview The current interest in virtualization has led to the creation of several different hypervisors. Most of these, however, predate hardware-assisted
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions Xi Xiong The Pennsylvania State University [email protected] Donghai Tian The Pennsylvania State University Beijing
Using Linux as Hypervisor with KVM
Using Linux as Hypervisor with KVM Qumranet Inc. Andrea Arcangeli [email protected] (some slides from Avi Kivity) CERN - Geneve 15 Sep 2008 Agenda Overview/feature list KVM design vs other virtualization
Enabling Intel Virtualization Technology Features and Benefits
WHITE PAPER Intel Virtualization Technology Enterprise Server Enabling Intel Virtualization Technology Features and Benefits Maximizing the benefits of virtualization with Intel s new CPUs and chipsets
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Virtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
Cloud Architecture and Virtualisation. Lecture 4 Virtualisation
Cloud Architecture and Virtualisation Lecture 4 Virtualisation TOC Introduction to virtualisation Layers and interfaces Virtual machines and virtual machine managers Hardware support Security 2 Virtualisation
Cloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Detection of virtual machine monitor corruptions
Detection of virtual machine monitor corruptions Benoît Morgan, Eric Alata, Vincent Nicomette LAAS-CNRS - Dependable Computing and Fault Tolerance (TSF) Team Journée SEC 2 - June 30th, 2015 Detection of
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
ELI: Bare-Metal Performance for I/O Virtualization
ELI: Bare-Metal Performance for I/O Virtualization Abel Gordon Nadav Amit Nadav Har El Muli Ben-Yehuda, Alex Landau Assaf Schuster Dan Tsafrir IBM Research Haifa Technion Israel Institute of Technology
A quantitative comparison between xen and kvm
Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.
Advanced Computer Networks. Network I/O Virtualization
Advanced Computer Networks 263 3501 00 Network I/O Virtualization Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week: Today: Software Defined
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1
Clouds Under the Covers KHALID ELGAZZAR GOODWIN 531 [email protected] Elgazzar - CISC 886 - Fall 2014 1 References Understanding Full Virtualization, Paravirtualization, and Hardware Assist White
Virtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University
Virtualization Technology Zhonghong Ou Data Communications Software Lab, Aalto University 1 Definition Virtualization refers to a concept in which access to a single underlying piece of hardware, like
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Hypervisors and Virtual Machines
Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
ARM VIRTUALIZATION FOR THE MASSES. Christoffer Dall <[email protected]> <[email protected]>
ARM VIRTUALIZATION FOR THE MASSES Christoffer Dall ARM Smartphones Smartphones Tablets Tablets ARM Servers But now also... But now also... ARM Servers
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
