Ring 0 to Ring -1 Attacks
|
|
|
- Polly Gibson
- 10 years ago
- Views:
Transcription
1 Ring 0 to Ring -1 Attacks HYPER-V IPC INTERNALS SYSCAN 2015 ALEX 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 1
2 WHO AM I? Chief Architect at CrowdStrike, a security startup Previously worked at Apple on ios Core Platform Team Co-author of Windows Internals 5 th and 6 th Editions Reverse engineering NT since 2000 main kernel developer of ReactOS Instructor of worldwide Windows Internals classes Conference speaking: SyScan NoSuchCon , Breakpoint 2012 Recon , 2006 Blackhat 2015, 2013, 2008 For more info, see 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 2
3 WHAT THIS TALK IS ABOUT The Microsoft Hypervisor (Hyper-V/Viridian) was introduced almost a decade ago Originally for Server only, it now ships on Clients too Powers not just Windows, but Azure and Xbox One too Very few internal details on it have ever emerged Ironically, Microsoft had the best details for it back in the WinHEC days [ref: Brandon Baker, Maryrita Steinhour] Some external researchers have looked at it MS11-047, MS [ref: ENRW / Matthias Luft & Felix Wilhelm] Any hypervisor is not a new security layer; it s a new place to find bugs. Nobody has talked about how to interface with it (just fuzzing for bugs) 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 3
4 TWO BUGS. IN. A. DECADE 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 4
5 WHAT THIS TALK IS ALSO ABOUT Azure 0 Days / Unicorns Hypervisor Rootkits / Blue, purple, red, magic, or any kind of pills Providing helpful direction on how to interface/play/mess with Hyper-V For research and learning purposes Please don t be an idiot and productize/ship any of this Unfortunately, interacting with Hyper-V requires some knowledge of Windows driver development And, especially, PnP Driver Development PnP Driver Development Sucks. Seriously. But it s OK. WE HAVE MEMES. And of course, a few interesting bugs/security issues A few brief notes on the future of Hyper-V in Windows 10 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 5
6 OUTLINE Hyper-V Architecture in 10 minutes or less or your money back VMM Type 1 and Type 2 Overall Architecture / VMBus / VMWP / VSC Partitions, Synthetic Interrupt Controller (SynIC), Overlay Pages Programming With Hyper-V Hypervisor Top Level Functional Specification Documentation Hypervisor Development Kit (HDK) Headers, WinHv and Vid Library Hypercalls IPC Ports (Events, Messages, Monitors) Windows PnP Driver Development in 10 minutes or less Demo Time QA & Wrap-up 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 6
7 Hyper-V Architecture 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 7
8 VMM Types Type-2 VMM: Host OS runs Virtual Machine, which runs guest environments.net CLR, Java VM Hybrid VMM: Host OS runs with Virtual Machine, which runs guest environments VMWare, QEMU, Virtual PC Type-1 VMM: Virtual Machine runs on barebones hardware, which runs Host OS and guest environments 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 8
9 Hyper-V Core Boot The Hyper-V Core is composed of the hypervisor kernel, loader, boot driver and debugger transport Hvloader.exe/efi (Windows 8+) Hypervisor Loader Hvix64.exe VMX Hypervisor Kernel Hvax64.exe SVM Hypervisor Kernel Kdhvcom.dll Hypervisor Kernel Debugger Transport Library Hvservice.sys (Windows 7: hvboot.sys) Hypervisor Boot Driver Before Windows 8, an early boot driver (hvboot.sys) parsed boot options to look for the hypervisor settings hvboot!hbhvlaunchhypervisor uses the BAL to launch Hvix64.exe or Hvax64.exe based on detected platform type In Windows 8+, the Boot Loader (Winload.exe/efi) calls OslArchHypervisorSetup to check for BCD Options Calls HvlpLaunchHvLoader as needed, which loads Hvloader.efi/exe 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 9
10 Partitions Each VM Instance, or unit of isolation, is called a partition The core virtualization stack runs in the root partition, which has full access to hardware However, the root partition also runs virtualized! The Hyper-V Management Services on the root partition create child partitions as needed Partitions communicate to the hypervisor kernel by using hypercalls Similar to system calls, but with call-specific ACLs Partitions can be Root/Parent Partitions (Windows) Enlightened Child Partitions (Windows or Linux) Unenlightened Child Partitions (3 rd party OS or legacy Linux) 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 10
11 Hyper-V Architecture Source: Microsoft TechNet 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 11
12 Hyper-V Devices Child partitions can have access to hardware by using Virtual Devices Virtual Devices (Vdevs) are implemented as a pair: Virtualization Service Consumers (VSCs), which run on the child and redirect device requests Virtualization Service Providers (VSPs), which run on the root partition and handle device access requests from children partitions Communication is done through the Virtual Machine Bus (VMBus) Manages channels between different root and children partitions Sometimes called ICs (Integration Components) or Synthetic Devices Enlightened I/O is yet another term For legacy devices (Serial Port, etc), emulated devices are used instead No quick path 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 12
13 Enlightened I/O Source: Microsoft TechNet 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 13
14 Virtualization Infrastructure Driver The VID is the main glue in the kernel responsible for connecting the Virtual Machine Management Services (VMMS) with the Hyper-V Kernel Lives in a driver called Vid.sys VID uses the Hypercall interface in order to send management commands to the hypervisor, such as Partition suspend/resume VP add/remove and policies Dynamic memory Partition create/delete Device visibility VID is also in charge of MMIO emulation for HAL-type drivers Also emulates ROMs User-mode side Vid.dll loads in Vmms.exe/Vmwp.exe and uses IOCTLs 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 14
15 CPU Management Root partition will assign certain logical processors to certain children partitions These processors are now called VPs or virtual processors The same logical processor on the root partition can be shared among multiple children partitions A scheduler determines and distributes workloads across the different partitions The root partition can install intercepts associated to certain events on the children partitions I/O Port Access, MSR Access, Exceptions, CPUID, GPA Access Hyper-V will suspend the virtual processor and send the root partition a message Root partition processes the message and must resume the VP 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 15
16 Memory Management Memory in Hyper-V is separated into three types GVA Guest Virtual Address (VA in the Child Partition) GPA Guest Physical Address (PA in the Child Partition) SPA System Physical Address (PA in the Root Partition) Using SLAT/Nested Page Tables, Hyper-V can map GVA->SPA 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 16
17 GPA Space On the root partition, GPA and SPA are identity mapped Pages cannot be unmapped, but different access rights can be set GPA can be in 3 states Mapped (GPA->SPA mapping exists) Unmapped (GPA->SPA mapping does not exist) Inaccessible (GPA is not valid for access) Most unmapped GPA pages in the root partition are accessible Provides ability to access MMIO devices But some are not for example, Local APIC is owned by the Hyper-V kernel Unmapped GPA access causes message to root partition Overlay GPA is used for virtual data structures such as hypercall page and statistics page, which are shared among all partitions 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 17
18 Virtual Interrupt Control The hypervisor virtualizes the local APIC and extends it into a Synthetic Interrupt Controller (SynIC) External and Internal Interrupts delivered to VPs are virtualized using 16 local vector tables known as SINT0-SINT15 (SINTx) Internal interrupts are generated when a VP writes to the APIC Interrupt Command Register (ICR) External interrupts are generated when a physical device generates an interrupt or the hypervisor has to deliver an internal timer or trace message SynIC is also involved in inter-partition communication when using Message Flags Messages Monitored Notifications 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 18
19 Hypercall Interface Allows code running under Hyper-V to call into the Hyper-V Kernel Either for management tasks, such as creating new partitions, getting tracing, debugging, and statistics information, installing intercepts, Or for inter-partition communication using ports Or for providing enlightenments for the guest OS Such as optimizing TLB Flushing or Spinlock Waiting Hypercalls can be simple or repeat Simple calls perform a single operation with fixed-size input Rep calls perform repeated operations based on a starting index and count Three calling conventions: Pass arguments in in/out data structure Pass arguments in x64 integer registers Pass arguments in x64 XMM vector registers 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 19
20 Hypercalls Hypercalls can only be done by code running at Ring 0 Internally, vmcall instruction is used, but Hyper-V kernel will generate #UD exception if CPL is not 0 Hypercalls return HV_STATUS return values, which are documented RDX:RAX used on x64 Hypercalls must return within 50 microseconds back to the partition Rep calls cannot guarantee this, therefore use hypercall continuations to resume execution after timeout Simple calls almost always complete in time, other than a few exceptions Input and output must be sent in aligned GPA addresses that do not straddle over a page Microsoft provides a C interface to hypercalls, abstracting these details 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 20
21 Programming With Hyper-V 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 21
22 Programming With Hyper-V 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 22
23 Hyper-V Documentation Microsoft has actually done an outstanding job documenting the Hyper-V hypervisor and related infrastructure Hyper-V has better documentation than the kernel 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 23
24 Top Level Functional Specification 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 24
25 TLFS 4.0a Latest version released last year covers Windows 8.1 and Server 2012 R2 TLFS describes internals of the hypervisor, as well as handling of virtual memory, scheduling, IPC, event logging, debugging, processor management, intercepts, and more (Almost) all hypercalls are documented, with full parameter and structure definitions Designed to allow 3 rd party OS vendors to interoperate with the hypervisor and create their own enlightenments for faster virtualization Also covers CPUID and MSRs specific to the hypervisor BDEF- 79EEF16E880B/Hypervisor%20Top%20Level%20Functional%20Specification% 20v4.0.docx 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 25
26 More like TL;DR 4.0a 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 26
27 Hyper-V Development To develop for Hyper-V, one needs three key pieces: Hypervisor Guest Development Kit (HVGDK.H) and HyperCall Headers (WINHV.H) HVGDK is the entire technical specification provided in header format WinHv headers provide an interface to the hypercalls by using standard Windows Driver API Virtualization Infrastructure Driver Headers (VID.H, VIDDEFS.H) Allows registration of intercepts, partition management, and state transition resilience Import Libraries (WINHV.LIB, VID.LIB) Allows linking with the WinHv driver to access the hypercall interface, and with Vid.sys/Vid.dll Vista Windows Driver Kit (Build 6000) ships with the HVGDK/WINHV headers But not the libraries to link with! VID is considered undocumented and not meant to be interfaced with Because of this, even with the HVGDK, programming the hypervisor is potentially dangerous, as there is no notification/management for sleep/resume/migration operations that can happen to a partition 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 27
28 Missing Libraries Wannabe Hyper-V Developer: This is remarkably silly. Microsoft has published the interfaces but not the.lib file and developers with good intentions are off doing miserable hackery in order to get their stuff working, as they have no other choice. Hyper-V Architect: Yup. I agree completely. The published interfaces will disappear in the next documentation drop. Since there is not really anything you could build with them that will work end-to-end, publishing them doesn't help anyone. 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 28
29 HVGDK Removed in WDK 7+ 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 29
30 But still present in Singularity 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 30
31 Obtaining the Required Bits For the HVGDK, you can use Singularity: Vid headers are also there (but we won t cover Vid programming now) However, this is becoming out-of-date. The more recent (but differently factored) headers are available in the Linux Integration Services HvStatus.h, HvTypes.h, Hv.h, HvHcApi.h HvVpApi.h, etc For WinHV Headers, you ll need to find an old version of the WDK May be available on MSDN How to get the Hypercall Library? Make your own! Use dumpbin to dump exports to.def file Link a.lib file based on the.def file Won t work on x86 due to decorations: you ll need a stub.c file to compile 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 31
32 Changes in Windows 7+ The virtualization stack in Windows 7 has been split to separate root partition stack components from child components For example, VMBus is now VMBus.sys and VMBusr.sys The same has happened to WinHV: WinHvr.sys, WinHv.sys This means you can no longer create a single driver that auto-detects the type of partition it s in Can t link to two separate import libraries with functions having the same name You ll need winhvr.lib and winhv.lib, and separate drivers Also, be wary of API changes between one version of WinHV and the next Windows 7 Port APIs now have a NUMA Node Requirement parameter Windows 10 SynIC APIs now expect a group affinity (GROUP_AFFINITY) 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 32
33 Inter-Partition Communication Events Represented as a single bit flag Array of 2048 bit flags is provided for each SynIC, covering 1/16 th of the SIEF Page Sender signals an event, which ORs the bit and sends an interrupt if not cleared Messages Represented as an arbitrary byte array of up to 256 bytes Array of 256 byte buffers is provided for each SynIC, covering 1/16 th of SIM Page Sender posts a message, which is added to a queue and sends an interrupt Sender acknowledges by writing to End-Of-Message (EOM) MSR or by APIC End-Of-Interrupt (EOI) Hypervisor will re-deliver message if not handled within a few milliseconds Guaranteed ordering if all delivery is within the same VP Monitored Notifications See TL;DR 4.1 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 33
34 Creating a Port 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 34
35 Connecting to a Port 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 35
36 Sending and Receiving Events WinHV maps the per-vp SynIC event page using an overlay page Sender uses HvSignalEvent, which sets corresponding flag bit Receiver calls WinHV to receive address of flags for given SynIC SIEF Page Receiver Port Sender Connection SINT0 Events SINT1 Events 2048 flags 2048 flags VP Partitions SINT15 Events 2048 flags Hypervisor Interrupt sent to receiver Acknowledged by clearing bit 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 36
37 Receiver Handling an Event 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 37
38 Sending Messages WinHV maps the per-vp SynIC message page with an overlay Sender uses HvPostMessage, which copies into a per-receiver buffer and queues the message Message header contains type, payload size, port ID and connection ID Receiver Sender SIM Page Port Connection SINT0 Messages SINT1 Messages 256 bytes 256 bytes VP Message Partitions SINT15 Messages 256 bytes Message Buffers Hypervisor Buffer 1 Busy Buffer 2 Busy Buffer 3 Interrupt sent to receiver Acknowledged by EOM write Buffer n Free 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 38
39 Receiver Handling a Message 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 39
40 Receiving Hyper-V Interrupts 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 40
41 Windows PnP Driver Development 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 41
42 Two Types of Windows Drivers When people write windows drivers, they are generally of two types: Legacy non-plug-and-play Drivers (also called kernel modules) Hardware Plug-and-Play Drivers (also called WDM drivers, or WDF drivers) Although both of these run in the kernel and have full Ring 0 rights, there are important internal differences in how they are handled PnP Drivers are expected to handle certain I/O operations from the kernel s Plug and Play Manager (called PIRPs) PnP Drivers receive a bus-enumerated device node (DEVICE_NODE) structure This ties them to hardware and the bus specific enumeration protocol PnP Drivers are allowed to request, filter, and translate resources They can register and handle interrupts They can create DMA Adapter Objects and perform DMA operations on the system PnP Drivers have access to additional Windows Kernel APIs 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 42
43 PnP-Driver-Only Windows APIs IoReportTargetDeviceChange(Asynchronous) Io(Get/Register)DeviceInteface IoOpenDeviceRegistryKey Io(Synchronous)InvalidateDeviceRelations IoRequestDeviceEject(Ex) IoInvalidateDeviceState IoGetDmaAdapter IoGetDeviceInstanceName Io(Get/Set)DevicePropertyData IoConnectInterrupt 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 43
44 Getting Started with Drivers 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 44
45 What makes you PnP? Internally, what the kernel really considers as a PnP Driver is a driver that has a device node (and without the DNF_LEGACY_RESOURCE_DEVICENODE flag set) This type of driver is called a PDO, or Physical Device Object It directly manages a hardware device So how can we become a PDO? Clearly this is needed for a virtual device like VMBus which needs to receive interrupts It turns out that this is a highly guarded process, with a standard way of doing things Causes a very visible contract to exist between user, hardware, and kernel Requires writing an INF file, becoming a root bus enumerated driver, etc 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 45
46 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 46
47 Root Bus Enumerated Drivers 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 47
48 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 48
49 Kernel Mode Driver Framework 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 49
50 Writing a Software PnP Driver It turns out that since NT 4 didn t actually have Plug-n-Play, there was a completely different way of accessing hardware resources There were no PDOs back then Each driver ran on its own, scanned the bus, found what it needed, and claimed it from the operating system IoAssignResources HalGetInterruptVector Other APIs which are all now marked as deprecated/legacy/dontuse Windows 2000 s WDM/PnP model broke all these legacy drivers since they didn t have a PDO Windows introduced some legacy APIs for backward compatibility: IoReportDetectedDevice IoReportResourceForDetection 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 50
51 IoReportDetectedDevice 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 51
52 Claiming APIC/MSI Interrupts With those APIs, we can now take our software driver, become a PDO, follow all the right PnP procedures, and register our interrupt! Not so fast In order to get the right to request an interrupt, the IRQ/GSIV resource must be associated with our PDO We can fake an interrupt resource by using the IoReportResourceForDetection API But this sets an internal flag and doesn t populate an undocumented registry key in the HARDWARE hive When we later try to connect to the interrupt, the ACPI IRQ Arbiter sees that, and refuses our attempt Because APIC/MSI-X interrupts are modern why would a legacy driver need to claim them? Repeated OSR posts from experts all claim you need an INF file Or a root-bus-enumerated driver using KMDF 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 52
53 INF Files Require Manual Install 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 53
54 Unless There s Another Way 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 54
55 IoAssignResources 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 55
56 Problem with Assigned Resources Now that you ve assigned resources, you own them and you can go ahead and claim them But, due to hardware architecture reasons, the resources that a device sees and the underlying hardware resources are not always the same Windows implements a translation and arbitration process to resolve these issues The ultimate point of this is that the IoConnectInterrupt call expects to receive the final, translated & assigned resources While IoAssignRessources only provides an intermediate step Real Plug-and-Play drivers will receive the final copy of these resources in a special PIRP called IRP_MN_START_DEVICE But self-reported fake PDOs do not receive IRP_MN_START_DEVICE until at the next reboot! 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 56
57 I want IRP_MN_START_DEVICE 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 57
58 Forcing IRP_MN_START_DEVICE This last hurdle is solved by reading a wonderful blog post from one of the principal Microsoft developers in the PnP World How to test PnP state changes in your driver Requires usage of the IoInvalidateDeviceState API Which we can call because we are a PDO now! This sends another PIRP: IRP_MN_QUERY_PNP_DEVICE_STATE Our response to this, with certain flags, will force one of the desired PIRPs to occur 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 58
59 Fake PDOs can Register Interrupts! 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 59
60 CHILD->ROOT MESSAGE DEMO 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 60
61 ROOT->CHILD EVENT DEMO 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 61
62 Interesting Hyper-V Behaviors Overlay pages are allocated as executable and at easy to guess virtual/physical locations Significantly increases attack surface risk if there is a bug in message passing, for example Fixed in Windows 10 Build VMCALL instruction is at fixed, executable address (by design). Interesting for ROP No real validation of port/connection IDs is done Can free a port ID even when it s in use Can free more port IDs than allocated, causing unsigned overflow, and confusion in the future allocation (massive amount of port IDs is allocated) Undocumented hypercalls exist, which can generate memory dumps, turn off the hypervisor, and more Reverse-engineer the hvix64.exe binary to find these Most are also visible in WinHV.sys 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 62
63 The Future Hyper-V will be heavily used in Windows 10 to provide increased platform security and isolation Pass-the-hash attacks will be mitigated with the introduction of Virtual Trust Levels / Virtual Secure Machine (VTL/VSM) Secure Kernel Mode (SKM) and Isolated User Mode (IUM) will provide security boundary even against Root Partition Ring 0 Attackers Other trustlets may be written over time to also isolate in the same way Rumors are that Docker-type applications will also use Hyper-V Part of codenamed Pico APIs in the kernel (SKM runs as a PicoProcess) May be called Chambers? Look for a talk on this at a future conference Full whitepaper will be upcoming in a new Phrack issue (yes, Phrack!) 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 63
64 QUESTIONS? SEE YOU AT THE NEXT SYSCAN MARCH 2016 SWISSOTEL MERCHANT COURT #SYSCAN16 4/12/2015 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 64
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
The Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
Cooperation of Operating Systems with Hyper-V. Bartek Nowierski ([email protected]) Software Development Engineer, Hyper-V Microsoft Corporation
Cooperation of Operating Systems with Hyper-V Bartek Nowierski ([email protected]) Software Development Engineer, Hyper-V Microsoft Corporation Presentation Agenda Hyper-V V Architecture Integration
Windows Server Virtualization & The Windows Hypervisor. Background and Architecture Reference
Windows Server Virtualization & The Windows Hypervisor Background and Architecture Reference Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization
10.04.2008. Thomas Fahrig Senior Developer Hypervisor Team. Hypervisor Architecture Terminology Goals Basics Details
Thomas Fahrig Senior Developer Hypervisor Team Hypervisor Architecture Terminology Goals Basics Details Scheduling Interval External Interrupt Handling Reserves, Weights and Caps Context Switch Waiting
Memory Forensics with Hyper-V Virtual Machines. By: @wyattroersma
Memory Forensics with Hyper-V Virtual Machines By: @wyattroersma Who Am I? Wyatt Roersma NVINT Senior Security Engineer Mad Security DFIR challenge creator The Hacker Academy Content Dev I research for
Monitoring Microsoft Hyper-V. eg Enterprise v6.0
Monitoring Microsoft Hyper-V eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Oracle Database 10g Performance on Windows Server 2008 Hyper-V Virtual Machine. By: Gary W Parker Performance Tuning Corporation
Oracle Database 10g Performance on Windows Server 2008 Hyper-V Virtual Machine By: Gary W Parker Performance Tuning Corporation Introduction Microsoft s current server operating system offering, Windows
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Nested Virtualization
Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization
KVM as a Microsoft-compatible hypervisor.
KVM as a Microsoft-compatible hypervisor. Vadim Rozenfeld KVM Forum, 2012 1 Agenda Microsoft Enlightenment KVM as a conformant hypervisor Performance Improvments 2 Microsoft Enlightenment
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research Agenda Hypervisor based isolation Firmware rootkit
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
KVM Security Comparison
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-349-7525 Fax: 512-349-7933 www.atsec.com KVM Security Comparison a t s e c i n f o r m a t i o n s e c u
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
Plug and Play for Windows 2000
Operating System Plug and Play for Windows 2000 White Paper Abstract This paper describes the Microsoft Windows 2000 operating system implementation of Plug and Play. Plug and Play is one of a number of
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
OSes. Arvind Seshadri Mark Luk Ning Qu Adrian Perrig SOSP2007. CyLab of CMU. SecVisor: A Tiny Hypervisor to Provide
SecVisor: A Seshadri Mark Luk Ning Qu CyLab of CMU SOSP2007 Outline Introduction Assumption SVM Background Design Problems Implementation Kernel Porting Evaluation Limitation Introducion Why? Only approved
HyperV_Mon 3.0. Hyper-V Overhead. Introduction. A Free tool from TMurgent Technologies. Version 3.0
HyperV_Mon 3.0 A Free tool from TMurgent Technologies Version 3.0 Introduction HyperV_Mon is a GUI tool for viewing CPU performance of a system running Hyper-V from Microsoft. Virtualization adds a layer
HyperV_Mon. Introduction. A Free Tool From TMurgent Technologies
HyperV_Mon A Free Tool From TMurgent Technologies Version 1.6 Introduction HyperV_Mon is a GUI tool for viewing CPU performance of a system running Hyper-V from Microsoft. Virtualization adds a layer of
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
Architecture of the Kernel-based Virtual Machine (KVM)
Corporate Technology Architecture of the Kernel-based Virtual Machine (KVM) Jan Kiszka, Siemens AG, CT T DE IT 1 Corporate Competence Center Embedded Linux [email protected] Copyright Siemens AG 2010.
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Introduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
COS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms
VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS
VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION
Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)
Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) ManolisMarazakis ([email protected]) Institute of Computer Science (ICS) Foundation
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture
Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2
Development of Type-2 Hypervisor for MIPS64 Based Systems
Development of Type-2 Hypervisor for MIPS64 Based Systems High Performance Computing and Networking Lab Al-Khwarizmi Institute of Computer Science University of Engineering & Technology Lahore Pakistan
Windows Server 2008 R2 Hyper V. Public FAQ
Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6
Sierraware Overview. Simply Secure
Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
<Insert Picture Here> Oracle Database Support for Server Virtualization Updated December 7, 2009
Oracle Database Support for Server Virtualization Updated December 7, 2009 Support Policy Server virtualization software allows multiple operating system instances to run on the same
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
KVM: Kernel-based Virtualization Driver
KVM: Kernel-based Virtualization Driver White Paper Overview The current interest in virtualization has led to the creation of several different hypervisors. Most of these, however, predate hardware-assisted
Performance tuning Xen
Performance tuning Xen Roger Pau Monné [email protected] Madrid 8th of November, 2013 Xen Architecture Control Domain NetBSD or Linux device model (qemu) Hardware Drivers toolstack netback blkback Paravirtualized
Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
Survey On Hypervisors
Survey On Hypervisors Naveed Alam School Of Informatics and Computing Indiana University Bloomington [email protected] ABSTRACT Virtual machines are increasing in popularity and are being widely adopted.
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)
KVM - The kernel-based virtual machine Timo Hirt [email protected] 13. Februar 2010 Abstract Virtualization has been introduced in the 1960s, when computing systems were large and expensive to operate. It
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
CPS221 Lecture: Operating System Structure; Virtual Machines
Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of
Multi-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
Abstract. Microsoft Corporation Published: November 2011
Linux Integration Services Version 3.2 for Hyper-V (Windows Server 2008, Windows Server 2008 R2, Microsoft Hyper-V Server 2008, and Microsoft Hyper-V Server 2008 R2) Readme Microsoft Corporation Published:
Operating System Overview. Otto J. Anshus
Operating System Overview Otto J. Anshus A Typical Computer CPU... CPU Memory Chipset I/O bus ROM Keyboard Network A Typical Computer System CPU. CPU Memory Application(s) Operating System ROM OS Apps
Hybrid Virtualization The Next Generation of XenLinux
Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
Intel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
Understanding Linux on z/vm Steal Time
Understanding Linux on z/vm Steal Time June 2014 Rob van der Heij [email protected] Summary Ever since Linux distributions started to report steal time in various tools, it has been causing
Best Practices for SAP on Hyper-V
Microsoft Collaboration Brief April 2010 Best Practices for SAP on Hyper-V Authors Josef Stelzel, Sr. Developer Evangelist, Microsoft Corporation [email protected] Bernhard Maendle, Architect, connmove
SharePoint Server 2010. SharePoint 2010 Virtualization Guidance and Recommendations
SharePoint Server 2010 SharePoint 2010 Virtualization Guidance and Recommendations DISCLAIMER This document is provided as-is. Information and views expressed in this document, including URL and other
What s new in Hyper-V 2012 R2
What s new in Hyper-V 2012 R2 Carsten Rachfahl MVP Virtual Machine Rachfahl IT-Solutions GmbH & Co KG www.hyper-v-server.de Thomas Maurer Cloud Architect & MVP itnetx gmbh www.thomasmaurer.ch Before Windows
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones ([email protected]) May 2011
Cloud^H^H^H^H^H Virtualization Technology Andrew Jones ([email protected]) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Cloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013
CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized
Pushing the Limits of Windows: Physical Memory Mark Russinovich (From Mark Russinovich Blog)
This is the first blog post in a series I'll write over the coming months called Pushing the Limits of Windows that describes how Windows and applications use a particular resource, the licensing and implementation-derived
Virtualization is set to become a key requirement
Xen, the virtual machine monitor The art of virtualization Moshe Bar Virtualization is set to become a key requirement for every server in the data center. This trend is a direct consequence of an industrywide
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
RED HAT ENTERPRISE VIRTUALIZATION & CLOUD COMPUTING
RED HAT ENTERPRISE VIRTUALIZATION & CLOUD COMPUTING James Rankin Senior Solutions Architect Red Hat, Inc. 1 KVM BACKGROUND Project started in October 2006 by Qumranet - Submitted to Kernel maintainers
Computer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
An Implementation Of Multiprocessor Linux
An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than
