Haven. Shielding applications from an untrusted cloud. Andrew Baumann Marcus Peinado Galen Hunt Microsoft Research
|
|
|
- Reginald Tucker
- 10 years ago
- Views:
Transcription
1 Haven Shielding applications from an untrusted cloud Andrew Baumann Marcus Peinado Galen Hunt Microsoft Research
2 In the old days Application Operating system 2
3 In the cloud Application Cloud platform Operating system Trust? 3
4 Hypervisor vulnerabilities are real November 13: Privilege escalation in Hyper-V October 14: Xen guest may read other VM s data May 15: Venom privilege escalation in Xen, KVM 4
5 Our goals for Haven Secure, private execution of unmodified applications (bugs and all) in an untrusted cloud on commodity hardware (Intel SGX) 5
6 Trust Can you trust the cloud? Huge trusted computing base Privileged software Hypervisor, firmware,... Management stack Staff Sysadmins, cleaners, security, Law enforcement Hierarchical security model Observe or modify any data Even if encrypted on disk / net Application Operating system Hypervisor Firmware/bootloader Management tools People 6
7 Current approaches 7
8 Hardware Security Modules Dedicated crypto hardware Expensive Limited set of APIs Key storage Crypto operations Protects the crown jewels, not general-purpose 8
9 Trusted hypervisors Hardware root of trust (e.g., TPM or TrustZone) Small, secure, hypervisor Multiplexes hardware Ensures basic security, such as strong isolation Problem #1: system administrators Problem #2: physical attacks (e.g. memory snooping) Problem #3: tampering with hypervisor 9
10 Remote attestation For example, using a TPM chip Basic idea: Signed measurement (hash) of privileged software Remote user checks measurement Incorrect attestation compromised software Problem: what is the expected measurement? Cloud provider applies patches and updates Must trust provider for current hash value 10
11 What do we really want? 11
12 Raw resources Untrusted I/O Secure colo provides: Power and cooling Network access 12
13 Shielded execution Protection of specific program from rest of system cf. protection, isolation, sandboxing, etc. New term (older concept) Program unmodified, naïve to threats Confidentiality and integrity of: The program Its intermediate state, control flow, etc. Input and output may be encrypted Host may deny service, cannot alter behaviour 13
14 Threat model We assume a malicious cloud provider Convenient proxy for real threats All the provider s software is malicious Hypervisor, firmware, management stack, etc. All hardware besides the CPU is untrusted DMA attacks, DRAM snooping, cold boot We do not prevent: Denial-of-service (don t pay!) Side-channel attacks (open problem) 14
15 Background: Intel SGX 15
16 Intel SGX Hardware isolation for an enclave New instructions to establish, protect Call gate to enter Remote attestation Secret Data Enclave Application (untrusted) EnclaveEntry: mov fs:[tcs],rbx mov fs:[cssa],eax cmp eax, 0 jne ExceptionEntry mov r10,fs:[resadr] cmp r10,0 jmp rcx, r8 mov rdx, r9 mov r8, rbx Operating system (untrusted) 16
17 Enclave Memory Processor designates physical memory range as EPC memory Specified by BIOS at boot time. EPC RAM is encrypted and integrity protected. Applied by processor as cache lines travel between the LLC and RAM RAM and memory buses are now outside the HW TCB. SGX access controls protect enclave memory inside the processor. Only code running in an enclave can access this enclave s memory. SGX access control Processor Package Memory Encryption engine EPC Cache RAM 17
18 Building an Enclave virtual address space physical address space Unprotected code or data code or data Untrusted code can tamper with Protected mapping EPC enclave creation code or data But any tampering will be recorded in 1. ECREATE(range) the enclave hash 2. EADD(page) 3. EEXTEND(page) SECS ENCLAVE HASH 4. EINIT(page) 18
19 Executing an Enclave EENTER: jumps to a fixed enclave address Defined during enclave construction EEXIT: jumps to any address outside the enclave Asynchronous exit due to interrupts, exceptions etc. Save and scrub processor state ERESUME: Resume enclave execution after an asynchronous exit. 19
20 Other features Sealed storage EGETKEY: Enclave can obtain persistent keys as a function of its enclave hash or author Attestation EPID group signature scheme Implemented in a special Quoting Enclave 20
21 SGX: what s new? (over prior trusted hardware) Doesn t rely on any trusted software Untrusted OS performs scheduling/multiplexing Paging support (Practically) unlimited number of distrusting enclaves Hardware TCB = CPU package Encrypted and integrity-protected RAM CPU-based attestation High level of physical security 21
22 Haven Design 22
23 Design challenge: Iago attacks Application Enclave System calls Operating system 23
24 Iago attacks malloc() returns pointer to user s stack Scheduler allows two threads to race in a mutex System has 379,283 cores and -42MB of RAM read() fails with EROFS Our approach: Don t try to check them all Admit OS into trusted computing base 24
25 Mutual distrust Haven Unmodified binaries Picoprocess (protects host from guest) Enclave (protects guest from host) Subset of Windows, enlightened to run in-process Shields LibOS from Iago attacks Includes typical kernel functionality Scheduling, VM, file system Untrusted interface with host Application Shield module Untrusted runtime Windows 8 API Library OS (Drawbridge) Drawbridge ABI Untrusted interface Drawbridge ABI & SGX priv ops Drawbridge host SGX driver Windows kernel 25
26 Untrusted interface Host/guest mutual distrust Policy/mechanism with a twist Virtual resource policy in guest Virtual address allocation, threads Physical resource policy in host Physical pages, VCPUs ~20 calls, restricted semantics Picoprocess Enclave Application Library OS Shield module Windows 8 API Drawbridge ABI Untrusted interface Untrusted runtime Drawbridge ABI & SGX priv ops Drawbridge host SGX driver Windows kernel 26
27 Untrusted interface Upcalls: ExceptionDispatch(ExceptionInfo) ThreadEntry() Downcalls: AsyncCancel(AsyncHandle) AsyncPoll(AsyncHandle) Results DebugStringPrint(Message) EventClear(EventHandle) EventSet(EventHandle) ObjectClose(Handle) ObjectsWaitAny(Num, Handles, Timeout) Idx ProcessExit(ExitCode) StreamAttributesQueryByHandle(StreamHandle) Attrs StreamFlush(StreamHandle) StreamGetEvent(StreamHandle, EventId) EventHandle StreamOpen(URI, Options) StreamHandle StreamRead(StreamHandle, Off, Sz, Bf) AsyncHandle StreamWrite(StreamHandle, Off, Sz, Bf) AsyncHandle SystemTimeQuery() Time ThreadCreate(Tcs) ThreadHandle ThreadExit() ThreadInterrupt(ThreadHandle) ThreadYieldExecution() VirtualMemoryCommit(Addr, Size, Prot) VirtualMemoryFree(Addr, Size) VirtualMemoryProtect(Addr, Size, Prot) 27
28 Shield module Memory allocator, region manager Host commits/protects specific pages No address allocation Private file system Encrypted, integrity-protected VHD Scheduler Don t trust host to schedule threads Exception handler Emulation of some instructions Sanity-check of untrusted inputs Anything wrong panic! 23 KLoC (half in file system) Picoprocess Enclave Application Library OS Shield module Windows 8 API Drawbridge ABI Untrusted interface Untrusted runtime Drawbridge ABI & SGX priv ops Drawbridge host SGX driver Windows kernel 28
29 SGX limitations 1. Dynamic memory allocation and protection New instructions needed 2. Exception handling SGX doesn t report page faults or GPFs to the enclave 3. Permitted instructions Good news! These are fixed in SGX v2 RDTSC/RDTSCP needed, for practicality and performance 4. Thread-local storage Can t reliably switch FS and GS 29
30 Performance evaluation Implemented and tested using SGX emulator Thanks, Intel! Problem: no SGX implementation yet Solution: model for SGX performance 1. TLB flush on Enclave crossings 2. Variable spin-delay for critical SGX instructions Enclave crossings Dynamic memory allocation, protection 3. Penalty for access to encrypted memory Slow overall system DRAM clock 30
31 Performance summary Depends on model parameters, details in paper 35% (Apache) 65% (SQL Server) slowdown vs. VM Assumes 10k+ cycles SGX instructions, 30% slower RAM and you don t have to trust the cloud! 31
32 SGX wish-list Exception handling overhead is high IRET, ERESUME require enclave exits A single application exception (e.g. stack growth) results in two exceptions and eight enclave crossings Demand loading Fixed in spec (EACCEPTCOPY), but we haven t tested it Shielded VMs Everybody wants this Not trivial: can t trap-and-emulate in hypervisor 32
33 What s next for Haven? Rollback of persistent storage Requires more hardware, or more communication Untrusted time Network time sync, RDTSC Cloud management Suspend / migrate applications [Lorch et al, NSDI 2015] Encrypted VLANs Side-channel defences Open problem [Xu et al, IEEE Security & Privacy 2015] 33
34 Conclusion Haven is closer to a true utility computing model Utility provides raw resources Doesn t care what you do with them Hope that SGX will be the first step in widespread hardware support for shielded execution 34
35 Backup 35
36 Related work TPM-based systems [Flicker, TrustVisor, Credo, Nexus, MiniBox] Vulnerable to simple physical attacks Typically relies on trusted hypervisor Prohibitively expensive otherwise [Flicker] Protecting user memory from the OS [Overshadow, SP³, CloudVisor, SecureME, InkTag, Virtual Ghost] Relies on trusted hypervisor or compiler [Virtual Ghost] Vulnerable to Iago attacks at syscall interface Homomorphic encryption No hardware in the TCB Suitable for some applications [CryptDB, Cipherbase, MrCrypt] Intolerable overheads for general-purpose computation 36
37 Background: Drawbridge Secure isolation of existing Windows applications Picoprocess for confinement Secure isolation container Low overhead (vs. a VM) Library OS for compatibility Enlightened Windows Strong app compatibility Application advapi32 kernel32 http ntoskrnl.dll Platform adaptation layer LSASS RPCSS SCM win32k RDP server ntdll user32 gdi32 ksecdd afd Win32 API Drawbridge ABI (45 calls) rdpvdd Windows kernel D. E. Porter, S. Boyd-Wickizer, J. Howell, R. Olinsky, G. C. Hunt, Rethinking the library OS from the top down, Proc. ASPLOS 11 Drawbridge driver 37
38 Provisioning App user Sensitive code/data (encrypted VHD) Trust decision Request Boots LibOS & runs app Cloud host Bare enclave Config Shield module Config Shield module Shield module 38
39 tpse Performance: SQL Server Native Hyper-V Drawbridge Haven (Host FS) Haven (VHD) Haven (Enc. VHD) 39
40 Throughput (req/s) Performance: Apache/MediaWiki Native Hyper-V Drawbridge Haven (Host FS) Haven (VHD) Haven (Enc. VHD) 40
41 tpse Sensitivity to SGX cost: SQL Server Memory allocation Enclave crossing Simulated delay (kcycles) 41
42 Throughput (req/s) Sensitivity to SGX cost: Apache Memory allocation Enclave crossing Simulated delay (kcycles) 42
43 Sensitivity to memory slowdown Hard to simulate: not many options Scaled down overall DRAM bandwidth and latencies by 33% SQL Server TPC-E throughput reduced by 21% Apache / MediaWiki throughput reduced by 7% Over-estimate: some accesses would be outside the enclave 43
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Privacy Protection in Virtualized Multi-tenant Cloud: Software and Hardware Approaches
Privacy Protection in Virtualized Multi-tenant Cloud: Software and Hardware Approaches Haibo Chen Institute of Parallel and Distributed Systems Shanghai Jiao Tong University http://ipads.se.sjtu.edu.cn/haibo_chen
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
Introduction to Virtual Machines
Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
Virtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
Cloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research Agenda Hypervisor based isolation Firmware rootkit
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Sierraware Overview. Simply Secure
Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Security Considerations in Cloud Deployments Matthew Garrett <[email protected]>
Security Considerations in Cloud Deployments Matthew Garrett (cloud) Computing for the Enterprise Security concerns in traditional hosting Someone hacks your system Your hosting
Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones ([email protected]) May 2011
Cloud^H^H^H^H^H Virtualization Technology Andrew Jones ([email protected]) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
The QEMU/KVM Hypervisor
The /KVM Hypervisor Understanding what's powering your virtual machine Dr. David Alan Gilbert [email protected] 2015-10-14 Topics Hypervisors and where /KVM sits Components of a virtual machine KVM Devices:
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Xen and the Art of. Virtualization. Ian Pratt
Xen and the Art of Virtualization Ian Pratt Keir Fraser, Steve Hand, Christian Limpach, Dan Magenheimer (HP), Mike Wray (HP), R Neugebauer (Intel), M Williamson (Intel) Computer Laboratory Outline Virtualization
Guardian: Hypervisor as Security Foothold for Personal Computers
Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure
Lecture Overview INF3510 Information Security Spring 2015 Fundamental computer security concepts CPU and OS kernel security mechanisms Virtualization Memory Protection Trusted computing and TPM Lecture
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Cloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
Scaling in a Hypervisor Environment
Scaling in a Hypervisor Environment Richard McDougall Chief Performance Architect VMware VMware ESX Hypervisor Architecture Guest Monitor Guest TCP/IP Monitor (BT, HW, PV) File System CPU is controlled
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
NoHype: Virtualized Cloud Infrastructure without the Virtualization
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee Princeton University ISCA 2010 Virtualized Cloud Infrastructure Run virtual machines
Run-Time Deep Virtual Machine Introspection & Its Applications
Run-Time Deep Virtual Machine Introspection & Its Applications Jennia Hizver Computer Science Department Stony Brook University, NY, USA Tzi-cker Chiueh Cloud Computing Center Industrial Technology Research
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
Real-time KVM from the ground up
Real-time KVM from the ground up KVM Forum 2015 Rik van Riel Red Hat Real-time KVM What is real time? Hardware pitfalls Realtime preempt Linux kernel patch set KVM & qemu pitfalls KVM configuration Scheduling
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
Virtualization is set to become a key requirement
Xen, the virtual machine monitor The art of virtualization Moshe Bar Virtualization is set to become a key requirement for every server in the data center. This trend is a direct consequence of an industrywide
Xen and XenServer Storage Performance
Xen and XenServer Storage Performance Low Latency Virtualisation Challenges Dr Felipe Franciosi XenServer Engineering Performance Team e-mail: [email protected] freenode: felipef #xen-api twitter:
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
Trusted VM Snapshots in Untrusted Cloud Infrastructures
Trusted VM Snapshots in Untrusted Cloud Infrastructures Abhinav Srivastava 1, Himanshu Raj 2, Jonathon Giffin 3, Paul England 2 1 AT&T Labs Research 2 Microsoft Research 3 School of Computer Science, Georgia
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
Using Linux as Hypervisor with KVM
Using Linux as Hypervisor with KVM Qumranet Inc. Andrea Arcangeli [email protected] (some slides from Avi Kivity) CERN - Geneve 15 Sep 2008 Agenda Overview/feature list KVM design vs other virtualization
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating
COS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms
Virtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
Cloud Architecture and Virtualisation. Lecture 4 Virtualisation
Cloud Architecture and Virtualisation Lecture 4 Virtualisation TOC Introduction to virtualisation Layers and interfaces Virtual machines and virtual machine managers Hardware support Security 2 Virtualisation
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Android Virtualization from Sierraware. Simply Secure
Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
12. Introduction to Virtual Machines
12. Introduction to Virtual Machines 12. Introduction to Virtual Machines Modern Applications Challenges of Virtual Machine Monitors Historical Perspective Classification 332 / 352 12. Introduction to
Introduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
Virtual Ghost: Protecting Applications from Hostile Operating Systems
Virtual Ghost: Protecting Applications from Hostile Operating Systems John Criswell University of Illinois at Urbana-Champaign [email protected] Nathan Dautenhahn University of Illinois at Urbana-Champaign
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation
Accelerate OpenStack* Together * OpenStack is a registered trademark of the OpenStack Foundation Where are your workloads running Ensuring Boundary Control in OpenStack Cloud. Raghu Yeluri Principal Engineer,
Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13
Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
Cloud Operating Systems for Servers
Cloud Operating Systems for Servers Mike Day Distinguished Engineer, Virtualization and Linux August 20, 2014 [email protected] 1 What Makes a Good Cloud Operating System?! Consumes Few Resources! Fast
Intel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud
StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched
Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1
Clouds Under the Covers KHALID ELGAZZAR GOODWIN 531 [email protected] Elgazzar - CISC 886 - Fall 2014 1 References Understanding Full Virtualization, Paravirtualization, and Hardware Assist White
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
RUNNING vtvax FOR WINDOWS
RUNNING vtvax FOR WINDOWS IN A AVT / Vere Technologies TECHNICAL NOTE AVT/Vere Technical Note: Running vtvax for Windows in a Virtual Machine Environment Document Revision 1.1 (September, 2015) 2015 Vere
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011
Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products
Virtualization Originally prepared by Greg Bosch; last modified April 2012 by B. Davison I. Introduction to Virtualization II. Virtual Appliances III. Benefits to Virtualization IV. Example Virtualization
