NoHype: Virtualized Cloud Infrastructure without the Virtualization



Similar documents
Hardware enhanced Security in Cloud Compu8ng. Cloud Compu8ng (Public IaaS)

Virtual Switching Without a Hypervisor for a More Secure Cloud

Virtualization. Pradipta De

Windows Server Virtualization & The Windows Hypervisor

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis

COS 318: Operating Systems. Virtual Machine Monitors

Nested Virtualization

Towards Trustworthy Architectures for Secure Cloud Servers and End-User Devices

Chapter 5 Cloud Resource Virtualization

Virtualization Technology. Zhiming Shen

Knut Omang Ifi/Oracle 19 Oct, 2015

Full and Para Virtualization

Compromise-as-a-Service

Virtualization Technologies

A Superior Hardware Platform for Server Virtualization

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Distributed Systems. Virtualization. Paul Krzyzanowski

Cloud Computing CS

A Threat Model for a Cloud Infrastructure with no Hypervisor

A Survey on Virtual Machine Security

Virtual machines and operating systems

I/O Virtualization The Next Virtualization Frontier

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

IOS110. Virtualization 5/27/2014 1

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Advanced Computer Networks. Network I/O Virtualization

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version Fix Pack 2.

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Enabling Intel Virtualization Technology Features and Benefits

Virtual Machines. COMP 3361: Operating Systems I Winter

Enabling Technologies for Distributed Computing

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Gavin Payne Senior Consultant.

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

How To Use Vsphere On Windows Server 2012 (Vsphere) Vsphervisor Vsphereserver Vspheer51 (Vse) Vse.Org (Vserve) Vspehere 5.1 (V

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Hyper-V Networking. Aidan Finn

Virtualization. Types of Interfaces

Virtualization. Dr. Yingwu Zhu

Hardware Based Virtualization Technologies. Elsie Wahlig Platform Software Architect

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality

Virtualization. Explain how today s virtualization movement is actually a reinvention

Reducing Cost and Complexity with Industrial System Consolidation

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)

Virtualization. Jia Rao Assistant Professor in CS

Introduction to the NI Real-Time Hypervisor

Basics of Virtualisation

BHyVe. BSD Hypervisor. Neel Natu Peter Grehan

x86 ISA Modifications to support Virtual Machines

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Virtual Computing and VMWare. Module 4

Architectural Support for Secure Virtualization under a Vulnerable Hypervisor

Introduction to Virtual Machines

Parallels Server 4 Bare Metal

Enabling Technologies for Distributed and Cloud Computing

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

KVM: Kernel-based Virtualization Driver

Intro to Virtualization

Intel Virtualization Technology Overview Yu Ke

How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

Virtualization Overview. Yao-Min Chen

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

The Best of Both Worlds with On-Demand Virtualization

Intel Virtualization Technology (VT) in Converged Application Platforms

Toward Exitless and Efficient Paravirtual I/O

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

PCI-SIG SR-IOV Primer. An Introduction to SR-IOV Technology Intel LAN Access Division

Hardware virtualization technology and its security

Data Centers and Cloud Computing

COS 318: Operating Systems. Virtual Machine Monitors

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

Virtual Machine Security

How To Create A Cloud Based System For Aaas (Networking)

Detection of virtual machine monitor corruptions

HyperV_Mon. Introduction. A Free Tool From TMurgent Technologies

How To Stop A Malicious Process From Running On A Hypervisor

Leveraging Virtualization in Aerospace & Defense Applications

Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

HyperV_Mon 3.0. Hyper-V Overhead. Introduction. A Free tool from TMurgent Technologies. Version 3.0

Cloud Computing #6 - Virtualization

The QEMU/KVM Hypervisor

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

Before we can talk about virtualization security, we need to delineate the differences between the

Enterprise-Class Virtualization with Open Source Technologies

PCI Express IO Virtualization Overview

SURVEY ON VIRTUALIZATION VULNERABILITIES

Virtualization and Cloud Computing

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Hypervisors and Virtual Machines

Chapter 14 Virtual Machines

A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

White Paper. Freescale s Embedded Hypervisor for QorIQ P4 Series Communications Platform

Transcription:

NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee Princeton University ISCA 2010

Virtualized Cloud Infrastructure Run virtual machines on a hosted infrastructure Benefits Economies of scale Dynamically scale (pay for what you use)

Without the Virtualization Virtualization used to share servers Software layer running under each virtual machine Guest VM1 Apps OS Guest VM2 Apps OS servers Hypervisor Physical Hardware 3

Without the Virtualization Virtualization used to share servers Software layer running under each virtual machine Malicious software can run on the same server Attack hypervisor Access/Obstruct other VMs Guest VM1 Guest VM2 Apps OS Apps OS servers Hypervisor Physical Hardware 4

Are these vulnerabilities imagined? No headlines doesn t mean it s not real Not enticing enough to hackers yet? (small market size, lack of confidential data) Virtualization layer huge and growing 100 Thousand lines of code in hypervisor 1 Million lines in privileged virtual machine Derived from existing operating systems Which have security holes 5

NoHype NoHype removes the hypervisor There s nothing to attack Complete systems solution Still retains the needs of a virtualized cloud infrastructure Guest VM1 Apps OS Guest VM2 Apps OS No hypervisor Physical Hardware 6

Virtualization in the Cloud Why does a cloud infrastructure use virtualization? To support dynamically starting/stopping VMs To allow servers to be shared (multi-tenancy) Do not need full power of modern hypervisors Emulating diverse (potentially older) hardware Maximizing server consolidation 7

Roles of the Hypervisor Isolating/Emulating resources CPU: Scheduling virtual machines Memory: Managing memory I/O: Emulating I/O devices Networking Managing virtual machines 8

Roles of the Hypervisor Isolating/Emulating resources CPU: Scheduling virtual machines Memory: Managing memory I/O: Emulating I/O devices Push to HW / Pre-allocation Networking Managing virtual machines 9

Roles of the Hypervisor Isolating/Emulating resources CPU: Scheduling virtual machines Memory: Managing memory I/O: Emulating I/O devices Networking Managing virtual machines Push to HW / Pre-allocation Remove 10

Roles of the Hypervisor Isolating/Emulating resources CPU: Scheduling virtual machines Memory: Managing memory I/O: Emulating I/O devices Networking Managing virtual machines Push to HW / Pre-allocation Remove Push to side 11

Roles of the Hypervisor Isolating/Emulating resources CPU: Scheduling virtual machines Memory: Managing memory I/O: Emulating I/O devices Networking Managing virtual machines Push to HW / Pre-allocation Remove Push to side NoHype has a double meaning no hype 12

timer switch Today I/O switch timer switch Scheduling Virtual Machines Scheduler called each time hypervisor runs (periodically, I/O events, etc.) Chooses what to run next on given core Balances load across cores VMs hypervisor time 13

NoHype Dedicate a core to a single VM Ride the multi-core trend 1 core on 128-core device is ~0.8% of the processor Cloud computing is pay-per-use During high demand, spawn more VMs During low demand, kill some VMs Customer maximizing each VMs work, which minimizes opportunity for over-subscription 14

Today Managing Memory Goal: system-wide optimal usage i.e., maximize server consolidation 600 500 400 300 200 100 VM/app 3 (max 400) VM/app 2 (max 300) VM/app 1 (max 400) 0 Hypervisor controls allocation of physical memory 15

NoHype Pre-allocate Memory In cloud computing: charged per unit e.g., VM with 2GB memory Pre-allocate a fixed amount of memory Memory is fixed and guaranteed Guest VM manages its own physical memory (deciding what pages to swap to disk) Processor support for enforcing: allocation and bus utilization 16

Today Emulate I/O Devices Guest sees virtual devices Access to a device s memory range traps to hypervisor Hypervisor handles interrupts Privileged VM emulates devices and performs I/O hypercall Priv. VM Device Emulation Real Drivers Guest VM1 Apps OS trap Hypervisor Guest VM2 Apps OS trap Physical Hardware 17

Today Emulate I/O Devices Guest sees virtual devices Access to a device s memory range traps to hypervisor Hypervisor handles interrupts Privileged VM emulates devices and performs I/O hypercall Priv. VM Device Emulation Real Drivers Guest VM1 Apps OS trap Hypervisor Guest VM2 Apps OS trap Physical Hardware 18

NoHype Dedicate Devices to a VM In cloud computing, only networking and storage Static memory partitioning for enforcing access Processor (for to device), IOMMU (for from device) Guest VM1 Apps OS Guest VM2 Apps OS Physical Hardware 19

NoHype Classify MUX MAC/PHY Virtualize the Devices Per-VM physical device doesn t scale Multiple queues on device Multiple memory ranges mapping to different queues Network Card Processor Chipset Peripheral bus Memory 20

Today Networking Ethernet switches connect servers server server 21

Today Networking (in virtualized server) Software Ethernet switches connect VMs Virtual server Virtual server Software Virtual switch 22

Today Networking (in virtualized server) Software Ethernet switches connect VMs Guest VM1 Apps OS Guest VM2 Apps OS Hypervisor hypervisor 23

Today Networking (in virtualized server) Software Ethernet switches connect VMs Priv. VM Software Switch Guest VM1 Apps OS Guest VM2 Apps OS Hypervisor 24

NoHype Do Networking in the Network Co-located VMs communicate through software Performance penalty for not co-located VMs Special case in cloud computing Artifact of going through hypervisor anyway Instead: utilize hardware switches in the network Modification to support hairpin turnaround 25

Today Managing Virtual Machines Allowing a customer to start and stop VMs Request: Start VM Wide Area Network Cloud Customer Cloud Provider 26

Today Managing Virtual Machines Allowing a customer to start and stop VMs Servers Request: Start VM Request: Start VM... Wide Area Network VM images Cloud Manager Cloud Customer Cloud Provider 27

Today Hypervisor s Role in Management Run as application in privileged VM Priv. VM VM Mgmt. Hypervisor Physical Hardware 28

Today Hypervisor s Role in Management Receive request from cloud manager Priv. VM VM Mgmt. Hypervisor Physical Hardware 29

Today Hypervisor s Role in Management Form request to hypervisor Priv. VM VM Mgmt. Hypervisor Physical Hardware 30

Today Hypervisor s Role in Management Launch VM Priv. VM VM Mgmt. Guest VM1 Apps OS Hypervisor Physical Hardware 31

NoHype Decouple Management And Operation System manager runs on its own core Core 0 Core 1 System Manager 32

NoHype Decouple Management And Operation System manager runs on its own core Sends an IPI to start/stop a VM Core 0 Core 1 System Manager IPI 33

NoHype Decouple Management And Operation System manager runs on its own core Sends an IPI to start/stop a VM Core manager sets up core, launches VM Not run again until VM is killed Core 0 Core 1 Guest VM2 System Manager IPI Core Manager Apps OS 34

Removing the Hypervisor Summary Scheduling virtual machines One VM per core Managing memory Pre-allocate memory with processor support Emulating I/O devices Direct access to virtualized devices Networking Utilize hardware Ethernet switches Managing virtual machines Decouple the management from operation 35

Security Benefits Confidentiality/Integrity of data Availability Side channels 36

Security Benefits Confidentiality/Integrity of data Availability Side channels 37

Confidentiality/Integrity of Data Requires access to the data With hypervisor Registers upon VM exit Packets sent through software switch Memory accessible by hypervisor NoHype No scheduling No software switch No hypervisor System manager can alter memory access rules But, guest VMs do not interact with the system manager 38

NoHype Double Meaning Means no hypervisor, also means no hype Multi-core processors Available now Extended (Nested) Page Tables Available now SR-IOV and Directed I/O (VT-d) Network cards now, Storage devices near future Virtual Ethernet Port Aggregator (VEPA) Next-generation switches 39

Conclusions and Future Work Trend towards hosted and shared infrastructures Significant security issue threatens adoption NoHype solves this by removing the hypervisor Performance improvement is a side benefit Future work: Implement on current hardware Assess needs for future processors 40

Questions? Contact info: ekeller@princeton.edu http://www.princeton.edu/~ekeller szefer@princeton.edu http://www.princeton.edu/~szefer 41