Rethink Package Components on De-Duplication: From Logical Sharing to Physical Sharing
|
|
|
- Veronica Kelley
- 10 years ago
- Views:
Transcription
1 Rethink Package Components on De-Duplication: From Logical Sharing to Physical Sharing Leaflet is wrong Kuniyashu Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh, Cyrille Artho Research Center of Information Security National Institute of Advanced Industrial Science and Technology & Yoshihito Watanebe Alpha Systems Inc.
2 Contents Rethink Package Components Vulnerability of logical sharing (Dynamic-Link Shared Library and Symbolic Link) Propose replacement of logical sharing by physical sharing Physical sharing Deduplication on Memory and Storage Self-contained binary It is NOT static-link binary. Experimental results Conclusions with discussing topics
3 Rethink Package Components Current Packages depend on Logical Sharing Logical sharing is OS technique to reduce consumption of memory and storage. Dynamic-Link Shared Library for memory and storage Symbolic Link for storage Unfortunately, they include vulnerability caused by dynamic management. Search Path Replacement Attack GOT (Global Offset Table) overwrite attack Dependency Hell Etc.
4 Search Path Replacement Attack Dynamic-link searches a shared library at run time using a search path. Search path is defined by environment variables. Example: LD_LIBRARY_PATH It allows us to change shared libraries for each process. Unfortunately, the search path is easily replaced by an attacker and leads to malicious shared libraries. Caller program has no methods to certify libraries. Static-link solves this problem but it wastes memory and storage.
5 GOT Overwrite Attack ELF format has GOT (Global Offset Table) to locate position-independent function address of shared library. The value of GOT is assigned at run time. GOT is created on Data Segment and vulnerable for overwrite attack. Static link solves this problem but it wastes memory and storage. Program Library Code Segment Call PLT Routine PLT Code Segment Data Segment GOT GOT Data Segment Attack
6 Dependency Hell (DLL Hell in Windows) Dependency Hell is a management problem of shared libraries. Package manager maintains versions of libraries. However, the version mismatch may occur, when a user updates a library without package manager. Dependency Hell llis escalated dby symbolic-link, because most shared libraries use symbolic-link to manage minor updates. /lib/libc.so.6 -> libc so # ln s libc so libc.so.6 Static link solves this problem but it wastes memory and storage.
7 Solution, and further problems The problems are solved by static-link, but it increases consumption of memory and storage. Fortunately, the increased consumption is mitigated by new technique, deduplication. SLINY[USENIX 05] developed deduplication in Linux kernel. It looks the problems are solved Two trends Current applications assume dynamic-link and are not re-compiled as static-link easily. Current virtualization offers us deduplication. SLINKY uses special Linux kernel. It is not applied on any Linux. Using virtualization, guest OS only has to solve the security problems without regard to physical consumption.
8 Static-Link is not easy [BIG Problem] Current applications depend on dynamic-link shared libraries for flexibility and avoiding license contamination. Some Licenses conflict and the code can not be mixed. Static link is not created with compile option, because dlopen() which calls shared library explicitly is used in main source codes. glibc, lb lb libx11, openssl, gcc, glib, lb pam Difficult to remove! We tried to re-compile /bin, /sbin, /usr/bin, and /usr/sbin dynamic-linked binaries (1,162) with static-link on Gentoo. 185 (15.9%) binaries are re-compiled with static-link. Binary packages make it difficult to re-compile, because they are not easy to get all source code. Commercial applications make problem more difficult.
9 Self-Contained Binaries Self-contained binary translator It is developed to bring a binary to another machine. It integrates shared libraries into an ELF binary file. Tools Statifier, Autopacage, Ermine for Linux Advantage Prevent Search Path Replacement Attack and Dependency Hell, because it integrates all libraries. Mitigate GOT Overwrite Attack, because the addresses are prefixed for each execution. Disadvantage Consume more memory and storage than static-link
10 Min: /usr/bin/qmake (3,426,340 -> 6,094,848 (x1.78) ) 6 shared libraries # ldd /usr/bin/qmake linux-gate.so.1 => (0xb78d5000) libstdc++.so.6 => /usr/lib/gcc/i686-pc-linux-gnu/ 4.3.4/libstdc++.so.6 (0xb77da000) libm.so.6 => /lib/libm.so.6 (0xb77b4000) libgcc_s.so.1 => /usr/lib/gcc/i686-pc-linux-gnu/ 4.3.4/libgcc_s.so.1 (0xb77a6000) libc.so.6 => /lib/libc.so.6 (0xb765e000) /lib/ld-linux.so.2 (0xb78d6000) Max: /usr/bin/gnome-open (5,400 -> 8,732,672 (x )) 22shared libraries # ldd /usr/bin/gnome-open l inux-gate.so.1 => (0xb772d000) libgnome-2.so.0 => /usr/lib/libgnome-2.so.0 (0xb ) libgnomevfs-2.so.0 => /usr/lib/libgnomevfs-2.so.0 (0xb76ae000) libxml2.so.2 => /usr/lib/libxml2.so.2 (0xb ) libm.so.6 => /lib/libm.so.6 (0xb ) libssl.so => /usr/lib/libssl.so (0xb ) libcrypto.so => /usr/lib/libcrypto.so (0xb73bc000) libz.so.1 => /lib/libz.so.1 (0xb73a8000) libutil.so.1 => /lib/libutil.so.1 (0xb73a4000) libbonobo-2.so.0 => /usr/lib/libbonobo-2.so.0 (0xb ) libbonobo-activation.so.4 => /usr/lib/libbonobo-activation.so.4 (0xb ) liborbitcosnaming-2 2.so.0 => /usr/lib/liborbitcosnaming-2 2.so.0 (0xb732c000) libgconf-2.so.4 => /usr/lib/libgconf-2.so.4 (0xb72f7000) liborbit-2.so.0 => /usr/lib/liborbit-2.so.0 (0xb72a2000) libgthread-2.0.so.0 => /usr/lib/libgthread-2.0.so.0 (0xb729c000) libpthread.so.0 => /lib/libpthread.so.0 (0xb ) librt.so.1 => /lib/librt.so.1 (0xb727a000) libdbus-glib-1.so.2 => /usr/lib/libdbus-glib-1.so.2 (0xb725c000) libnsl.so.1 => /lib/libnsl.so.1 (0xb ) libdbus-1.so.3 => /usr/lib/libdbus-1.so.3 (0xb720b000) libgio-2.0.so.0 => /usr/lib/libgio-2.0.so.0 (0xb ) libresolv.so.2 => /lib/libresolv.so.2 (0xb ) libgobject-2.0.so.0 => /usr/lib/libgobject-2.0.so.0 (0xb ) libgmodule-2.0.so.0 => /usr/lib/libgmodule-2.0.so.0 (0xb ) libdl.so.2 => /lib/libdl.so.2 (0xb711c000) libglib-2.0.so.0 => /usr/lib/libglib-2.0.so.0 (0xb ) libpopt.so.0 => /usr/lib/libpopt.so.0 (0xb ) libc.so.6 => /lib/libc.so.6 (0xb6ef1000) /lib/ld-linux.so.2 (0xb772e000)
11 Statifier (1/2) Creation of self-contained binary by Statifier Statifier emulates normal loader and gets allocation information Take snapshot before _dl_start_user() and analyze allocation information of functions of libraries from /proc/pid/maps. The libraries and allocation information are embedded into the binary.
12 Self-Contained Binary Statifier (2/2) Allocation information and shared libraries are loaded by the starter which is embedded ELF binary by statifier. Includes special libraries: linux-gate.so, ld-linux.so The ELF binary has no INTERP segment to call ld-linux.so ldd command shows no dynamic-link shared libraries Statifier makes a larger binary than static link. Increased memory and storage are mitigated by deduplication.
13 Deduplication Technique to share same-content chunks at block level (memory and storage). Same-content chunks are shared by indirect link. It is easy to implement when a virtual layer exists to access a block device. Some virtualizations include deduplication mechanism.
14 Storage Deduplication Used by CAS (Content addressable Storage) data is not addressed by its physical location. Data is addressed by a unique name derived from the content (a secure hash is used as a unique name usually) Same contents are expressed by one original content (same hash) and addressed by indirected link. Plan9 has Venti [USENIX FAST02] Data Domain (EMC) Deduplication [USENIX FAST08] LBCAS (Loopback Content Addressable Storage) [LinuxSymp09] Virtual Disk Indexing CAS Storage Archive Address SHA FFF 4ad36ffe FFF 974daf34a BFFF 2d34ff3e1 000C FFFF 974daf34a Deduplication sharing New block is created with new SHA-1
15 Memory Deduplication Memory deduplication is mainly used for virtual machines. Very effective when same guest OS runs on several virtual machines. On Virtual Machine Monitor Disco[OSDI97] has Transparent Page Sharing VMWare ESX has Content-Based Page Sharing [SOSP02] Xen has Satori[USENIX09] and Differential Engine[OSDI08] On Kernel Linux has KSM (Kernel Samepage Merging) from [LinuxSymp09] Memory of Process(es) are deduplicated KVM uses this mechanism These targets are virtual machines, but our proposal uses memory deduplication on single OS image, which increase same pages with copy of libraries (self-contained binary). Guest Physical Memory VM1 VM2 VM(n) Real Physical Memory
16 Evaluation Evaluate the effect of moving form logical sharing to physical sharing. Effect of dynamic link shared library (logical sharing) Gentoo installed on 32GB virtual disk for KVM virtual machine Effect of Statifier (remove logical sharing and increase consumption on memory and storage) Applied on binaries under /bin,/sbin,/usr/bin,/usr/sbin Memory Deduplication KSM (Kernel Samepage merging) of Linux with KVM virtual machine (758MB). Storage Deduplication LBCAS (Loopback Content Addressable Storage)
17 Effect of Dynamic Link Shared Library 42 normal processes were running at the end of login. Shared libraries overlapped on physical memory (total Virtual memory used by library) / (Physical memory Used by library) = ((B) - (C) )/ ((A) - (C)) = 86,184KB / 13,016KB = 6.62 (A) Consumed physical memory 54,760 KB (B) Summation of consumed memory by each process (Size on /proc/[pid]/smaps) 127,928 KB (C) Summation of process own memory 41,744KB The overlap was 6.62 times. Information obtained by /proc/[pid]smaps PID RSS SHARED (79%) (26%) (78%) (81%) (72%) (81%) (83%) (47%) (72%) (79%) Number of libraries used by 42 processes Usued Name 42 linux-gate.so.1 42 /lib/ld-linux.so.2 42 libc.so.6 32 libdl.so.2 29 libpthread.so.0 27 libpcre.so.3 27 libnsl.so.1 26 libglib-2.0.so.0 25 libgobject-2.0.so.0 24 libm.so.6 Included by all processes
18 Static Analysis of Statifier Gentoo was customized by statifier. The ELF (1,162) binaries under /bin (82 files), /sbin (74), /usr/bin (912), /usr/sbin (94) were customized by statifier. Original (Dynamic-link) Statifier Increase Total 87,865,480 3,572,936, Average 75,615 3,074, Max (gnome-open) 5,400 8,732, Min (qmake) 3,426,340 6,094, The disk image (includes non-statifiered files) was expnaded from 3.75GB to 7.08GB (1.88 times).
19 Effect of Memory Deduplication Memory usage at the end of login Statifier expanded memory consumption from the view of GuestOS, but Deduplication reduced physical memory consumption. 4KB page % GuestOS View GuestOS View 93.0% % physical memory % physical memory Duplicated Deduplicate Unique 0 Normal Gentoo Statifier Gentoo
20 Trace of memory consumption Normal Gentoo Statifer Gentoo Loopback GuestOS View Physical Mem View GuestOS View Physical Mem View Auto login Auto login LBCAS (256KB) GuestOS View Physical Mem View GuestOS View Physical Mem View Auto login Auto login
21 Effect of Storage Deduplication Storage usage (static) and total read data at boot (dynamic). Statifier expanded storage consumption from the view of GuestOS on both cases, but Deduplication reduced physical storage consumption in static and dynamic. Smaller chunk is easy to be deduplicated but time overhead is large. Static Dynamic (boot) normal statifier normal statifier On Loopback (Guest OS View) 3,754MB 7,075MB (1.88) 151.7MB 341.0MB (2.25) LBCAS 16KB 268,454 [4195MB] 4352MB [278,499] (1.04) LBCAS 64KB 74,679 [4667MB] 83,863 [5241MB] (1.12) 218MB [3,481] 304MB [4,866] (1.40) LBCAS 256KB 22,806 [5701MB] 6723MB [26,892] (1.18) 390MB [1,560 ] 505MB [2,019] (1.29)
22 Time overhead at boot Statifier reduced the boot time, because it eliminated dynamic reallocation overhead. Deduplication increased the boot time. The overhead of KSM and LBCAS was less than 37%. The overhead is a penalty to remove the vulnerabilities of logical sharing. Without KSM With KSM Normal Statifier Normal Statifier Loopback 95s 84s 95s 105s Reduced LBCAS (256KB) 107s 108s 115s 130s
23 Conclusion & Discussion Self-Contained binaries strengthen OS security. Prevent Search Path Replacement Attack, GOT (Global Offset Table) overwrite attack, Dependency Hell Easy to apply on normal OS. It does not require source code and re-compile. Increase consumption of memory and storage. Deduplication mitigates the consumption of memory and storage caused by self-contained binary. Encourage moving from Logical sharing to Physical Sharing Deduplication is utilized to increase security on single OS. *Technical detail is written in USENIX HotSec2010 Paper, Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine
24 Conclusion & Discussion Re-think the packages of Linux distributions Self-Contained binaries is temporary solution. We should rethink to remove logical sharing which cause security problems, because same contents are shared on memory and storage dedeuplcation. Deduplication will be mainly used on IaaS type (multi-tenants) Cloud Computing. *Technical detail is written in USENIX HotSec2010 Paper, Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine
Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication
Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho Research Institute for Secure Systems EuroSec 2012 at Bern,
Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication
Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho National Institute of Advanced Industrial Science and Technology
OS-Circular : A Framework of Internet Client with Xen
OS-Circular : A Framework of Internet Client with Xen http://openlab.jp/oscircular/ Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh National Institute of Advanced Industrial Science and Technology
Analysis of Disk Access Patterns on File Systems for Content Addressable Storage
Analysis of Disk Access Patterns on File Systems for Content Addressable Storage Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, and Cyrille Artho National Institute of Advanced Industrial Science and Technology
HTTP-FUSE PS3 Linux: an internet boot framework with kboot
HTTP-FUSE PS3 Linux: an internet boot framework with kboot http://openlab.jp/oscirclar/ Kuniyasu Suzaki and Toshiki Yagi National Institute of Advanced Industrial Science and Technology Embedded Linux
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
The future is in the management tools. Profoss 22/01/2008
The future is in the management tools Profoss 22/01/2008 Niko Nelissen Co founder & VP Business development Q layer Agenda Introduction Virtualization today Server & desktop virtualization Storage virtualization
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Automated deployment of virtualization-based research models of distributed computer systems
Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow
OPERATING SYSTEM - MEMORY MANAGEMENT
OPERATING SYSTEM - MEMORY MANAGEMENT http://www.tutorialspoint.com/operating_system/os_memory_management.htm Copyright tutorialspoint.com Memory management is the functionality of an operating system which
Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones ([email protected]) May 2011
Cloud^H^H^H^H^H Virtualization Technology Andrew Jones ([email protected]) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Virtualization: Know your options on Ubuntu. Nick Barcet. Ubuntu Server Product Manager [email protected]
Virtualization: Know your options on Ubuntu Nick Barcet Ubuntu Server Product Manager [email protected] Agenda Defi nitions Host virtualization tools Desktop virtualization tools Ubuntu as a guest
Cloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Installation Guide for FTMS 1.6.0 and Node Manager 1.6.0
Installation Guide for FTMS 1.6.0 and Node Manager 1.6.0 Table of Contents Overview... 2 FTMS Server Hardware Requirements... 2 Tested Operating Systems... 2 Node Manager... 2 User Interfaces... 3 License
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Computing in High- Energy-Physics: How Virtualization meets the Grid
Computing in High- Energy-Physics: How Virtualization meets the Grid Yves Kemp Institut für Experimentelle Kernphysik Universität Karlsruhe Yves Kemp Barcelona, 10/23/2006 Outline: Problems encountered
Pete s All Things Sun: Comparing Solaris to RedHat Enterprise and AIX Virtualization Features
Pete s All Things Sun: Comparing Solaris to RedHat Enterprise and AIX Virtualization Features PETER BAER GALVIN Peter Baer Galvin is the chief technologist for Corporate Technologies, a premier systems
FAST 11. Yongseok Oh <[email protected]> University of Seoul. Mobile Embedded System Laboratory
CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of flash Memory based Solid State Drives FAST 11 Yongseok Oh University of Seoul Mobile Embedded System Laboratory
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Windows Server 2012 授 權 說 明
Windows Server 2012 授 權 說 明 PROCESSOR + CAL HA 功 能 相 同 的 記 憶 體 及 處 理 器 容 量 虛 擬 化 Windows Server 2008 R2 Datacenter Price: NTD173,720 (2 CPU) Packaging All features Unlimited virtual instances Per processor
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
Technical Investigation of Computational Resource Interdependencies
Technical Investigation of Computational Resource Interdependencies By Lars-Eric Windhab Table of Contents 1. Introduction and Motivation... 2 2. Problem to be solved... 2 3. Discussion of design choices...
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
ESX System Analyzer Version 1.0 Installation Guide
ESX System Analyzer Version 1.0 Installation Guide Page 1 Table of Contents ESX System Analyzer Installation Guide 1. Installing ESX System Analyzer... 3 ESX System Analyzer Appliance Distribution... 3
Memory Resource Management in VMware ESX Server
Memory Resource Management in VMware ESX Server Carl Waldspurger OSDI 02 Presentation December 10, 2002 Overview Context Memory virtualization Reclamation Sharing Allocation policies Conclusions 2 2 Motivation
LiveCD Howto (CentOS 4) - Step by step - 01/12/2006 - Ver 1.1
LiveCD Howto (CentOS 4) - Step by step - 01/12/2006 - Ver 1.1 (This howto is for CentOS 4.4 i386. The version numbers may be different) Overview This howto illustrate the way to "compile" your own LiveCD
RED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Are Cache Attacks on Public Clouds Practical?
Are Cache Attacks on Public Clouds Practical? Thomas Eisenbarth Joint work with Gorka Irazoqui, Mehmet Sinan Inci, Berk Gulmezoglu and Berk Sunar WPI - 10/19/2015 Outline Cloud Computing and Isolation
Practical Experiences With Software Crash Analysis in TV. Wim Decroix/Yves Martens, TPVision
Practical Experiences With Software Crash Analysis in TV, TPVision Overview Context One-slide overview of tooling approach Practical usecases 2 Context: SPACE SW Architecture amapi amapp AnyApp AnyApp
WHITE PAPER. Permabit Albireo Data Optimization Software. Benefits of Albireo for Virtual Servers. January 2012. Permabit Technology Corporation
WHITE PAPER Permabit Albireo Data Optimization Software Benefits of Albireo for Virtual Servers January 2012 Permabit Technology Corporation Ten Canal Park Cambridge, MA 02141 USA Phone: 617.252.9600 FAX:
Two-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
CS5460: Operating Systems
CS5460: Operating Systems Lecture 13: Memory Management (Chapter 8) Where are we? Basic OS structure, HW/SW interface, interrupts, scheduling Concurrency Memory management Storage management Other topics
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
Virtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Document version 1.0 Gianluca Della Corte, IBM Tivoli Monitoring software engineer Antonio Sgro, IBM Tivoli Monitoring
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
An analysis of how static and shared libraries affect memory usage on an IP-STB
An analysis of how static and shared libraries affect memory usage on an IP-STB Master of Science Thesis in the Programme Networks and Distributed Systems Dongping Huang Chalmers University of Technology
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing
1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control
09'Linux Plumbers Conference
09'Linux Plumbers Conference Data de duplication Mingming Cao IBM Linux Technology Center [email protected] 2009 09 25 Current storage challenges Our world is facing data explosion. Data is growing in a amazing
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
RED HAT DEVELOPER TOOLSET Build, Run, & Analyze Applications On Multiple Versions of Red Hat Enterprise Linux
RED HAT DEVELOPER TOOLSET Build, Run, & Analyze Applications On Multiple Versions of Red Hat Enterprise Linux Dr. Matt Newsome Senior Engineering Manager, Tools RED HAT ENTERPRISE LINUX RED HAT DEVELOPER
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Update 5 Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Operating Systems Virtualization mechanisms
Operating Systems Virtualization mechanisms René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Contents 1 Introduction 2 Hardware Virtualization mechanisms
The Monitis Monitoring Agent ver. 1.2
The Monitis Monitoring Agent ver. 1.2 General principles, Security and Performance Monitis provides a server and network monitoring agent that can check the health of servers, networks and applications
Monitoring Databases on VMware
Monitoring Databases on VMware Ensure Optimum Performance with the Correct Metrics By Dean Richards, Manager, Sales Engineering Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 www.confio.com
The Tor VM Project. Installing the Build Environment & Building Tor VM. Copyright 2008 - The Tor Project, Inc. Authors: Martin Peck and Kyle Williams
The Tor VM Project Installing the Build Environment & Building Tor VM Authors: Martin Peck and Kyle Williams Table of Contents 1. Introduction and disclaimer 2. Creating the virtualization build environment
Memory Management Outline. Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging
Memory Management Outline Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging 1 Background Memory is a large array of bytes memory and registers are only storage CPU can
How To Backup Your Computer With A File Copy Engine
Secondary Backup Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Secondary Backup Data Archival Backup Secondary Backup
Solution Guide Parallels Virtualization for Linux
Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux
Acronis Backup & Recovery 10 Server for Linux. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
Using NixOS for declarative deployment and testing
Using NixOS for declarative deployment and testing Sander van der Burg Eelco Dolstra Delft University of Technology, EEMCS, Department of Software Technology February 5, 2010 Linux distributions There
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Technical Properties. Mobile Operating Systems. Overview Concepts of Mobile. Functions Processes. Lecture 11. Memory Management.
Overview Concepts of Mobile Operating Systems Lecture 11 Concepts of Mobile Operating Systems Mobile Business I (WS 2007/08) Prof Dr Kai Rannenberg Chair of Mobile Business and Multilateral Security Johann
Deploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY Syamsul Anuar Abd Nasir Fedora Ambassador Malaysia 1 ABOUT ME Technical Consultant for Warix Technologies - www.warix.my Warix is a Red Hat partner Offers
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Virtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
PARALLELS CLOUD SERVER
PARALLELS CLOUD SERVER An Introduction to Operating System Virtualization and Parallels Cloud Server 1 Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating System Virtualization...
IBM. Kernel Virtual Machine (KVM) Best practices for KVM
IBM Kernel Virtual Machine (KVM) Best practices for KVM IBM Kernel Virtual Machine (KVM) Best practices for KVM Note Before using this information and the product it supports, read the information in
Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.
Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009
CS 695 Topics in Virtualization and Cloud Computing. Introduction
CS 695 Topics in Virtualization and Cloud Computing Introduction This class What does virtualization and cloud computing mean? 2 Cloud Computing The in-vogue term Everyone including his/her dog want something
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors Benoit Boissinot E.N.S Lyon directed by Christine Morin IRISA/INRIA Rennes Liviu Iftode Rutgers University Phenix
Comparison of Memory Balloon Controllers
Comparison of Memory Balloon Controllers Presented by: PNVS Ravali Advisor: Prof. Purushottam Kulkarni June 25, 2015 Ravali, CSE, IIT Bombay M.Tech. Project Stage 2 1/34 Memory Overcommitment I Server
Decentralized Deduplication in SAN Cluster File Systems
Decentralized Deduplication in SAN Cluster File Systems Austin T. Clements Irfan Ahmad Murali Vilayannur Jinyuan Li VMware, Inc. MIT CSAIL Storage Area Networks Storage Area Networks Storage Area Networks
Distributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
