5,258 Hits in 4.4 sec

Modeling and Abstraction of Memory Management in a Hypervisor [chapter]

Pauline Bolignano, Thomas Jensen, Vincent Siles
2016 Lecture Notes in Computer Science  
In particular, we provide details about how the management of page tables has been formally modeled.  ...  This paper is concerned with proving memory isolation properties about the virtualization of the memory management unit provided by a hypervisor through shadow page tables.  ...  However not all the memory addresses of the concrete model are to be abstracted in the segments of a guest i, we define below which addresses are abstracted for each guest, and in which segment they are  ... 
doi:10.1007/978-3-662-49665-7_13 fatcat:5xagght3ofatfbgdjhcthfjylq

Host-Based Virtual Networks Management in Cloud Datacenters

Dimitris Kontoudis, Panayotis Fouliras
2017 Computing and informatics  
Infrastructure management is of key importance in a wide array of computer and network environments.  ...  In this paper we propose an information model for managing virtual network architectures, where hypervisors and computing server resources are deployed as the basis of the networking layer.  ...  Hypervisor concepts in a modeling and management context are largely overlooked.  ... 
doi:10.4149/cai_2017_3_541 fatcat:bpcqw3gy4jgxrky4geo2oc5odq

Trustworthy Memory Isolation of Linux on Embedded Devices [chapter]

Hamed Nemati, Mads Dam, Roberto Guanciale, Viktor Do, Arash Vahidi
2015 Lecture Notes in Computer Science  
We prove memory isolation of the hosted components along with information flow security for an abstract top level model of the virtualization mechanism.  ...  The verification is performed using the HOL4 theorem prover and uses a detailed model of the ARMv7-A ISA, including the MMU.  ...  These events model invocations of the hypervisor handlers as atomic transformations H a operating on an abstract machine state.  ... 
doi:10.1007/978-3-319-22846-4_8 fatcat:gv5qmeojtbgg5nedfbmo2mvbgq

Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor

Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui
2021 USENIX Security Symposium  
Lower hypervisor layers that configure and control hardware are verified using a novel machine model that includes multiprocessor memory management hardware such as multi-level shared page tables, tagged  ...  Higher hypervisor layers that build on the lower layers are then verified using a more abstract and simplified model, taking advantage of layer encapsulation to reduce proof burden.  ...  security proof of a commodity hypervisor using multiprocessor memory management hardware.  ... 
dblp:conf/uss/LiLGNH21 fatcat:ufzekshn7jgkbowr2yvyd2abfu

PowerVM, The Server Virtualization Without Limits

M N Nachappa, Mary Merline Rani, Mrinmoyee Mrinmoyee
It is the first multiplatform portfolio of virtual solutions for ebusiness.Recent advances in hardware and software technology have brought virtualizationto the forefront of IT management .PowerVM allows  ...  Virtualmachine technology, or virtualization, is gaining momentum in the information technologycommunity since it can satisfy peak scalability requirements without a costly, oversizedinfrastructure by  ...  partitions to share a common pool of physical memory .The physical memory of an IBM Power System can be assigned to multiple logical partitions in either a dedicated or shared mode.  ... 
doi:10.24297/ijmit.v3i2.1365 fatcat:laxopc2firdvhlvpgetlsj4f5u

Bottom-up harmonisation of management attributes describing hypervisors and virtual machines

Vitalian A. Danciu, Nils Gentschen Felde, Michael Kasch, Martin G. Metzker
2011 2011 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM)  
In response, we present a classification of bottomup attribute matching patterns and propose a methodology for the systematic processing of management attributes.  ...  We analyse the problem dimensions of attribute harmonisation according to a common management scenario and show why heterogeneity at hypervisor and VM level is difficult to deal with at present.  ...  ACKNOWLEDGMENT The authors wish to thank the members of the Munich Network Management (MNM) Team for helpful discussions and valuable comments on previous versions of this paper.  ... 
doi:10.1109/svm.2011.6096460 fatcat:jyx67x2buvfqlpvbpeyqm2quhe

On the verification of system-level information flow properties for virtualized execution platforms

Christoph Baumann, Oliver Schwarz, Mads Dam
2019 Journal of Cryptographic Engineering  
and confidentiality, and soundly refine the result for different instantiations of the abstract components at a later stage.  ...  As a case study, we apply this methodology to the verification of information flow security for an industry-scale security-oriented hypervisor on the ARMv8-A platform and report on the complete verification  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s13389-019-00216-4 fatcat:rr3ucswbyvanzg7seuk5d4lisy

Rebooting Virtualization Research (Again)

Alain Tchana, Renaud Lachaize
2019 Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems - APSys '19  
We explain why the guest virtual machine abstraction is still relevant in such a new hardware environment and we discuss challenges and ideas for hypervisor and guest OS design in this context.  ...  We argue that the upcoming trends of hardware disaggregation in the data center motivate a new chapter of virtualization research.  ...  Acknowledgments This work was funded by the "ScaleVisor" project of Agence Nationale de la Recherche, number ANR-18-CE25-0016, and the "Studio virtuel" project of BPI and ERDF/FEDER, grant agreement number  ... 
doi:10.1145/3343737.3343746 dblp:conf/apsys/TchanaL19 fatcat:ebci6n7pznexfenam5vkoxydna

Provably secure memory isolation for Linux on ARM

Roberto Guanciale, Hamed Nemati, Mads Dam, Christoph Baumann
2016 Journal of Computer Security  
Work partially supported by framework grant "IT 2010" from the Swedish Foundation for Strategic Research, and the CERCES grant from the Swedish Civil Contingencies Agency.  ...  Memory Management The virtual memory layout is defined by a set of page tables that reside in physical memory.  ...  To this end an implementation model is introduced, which uses virtual addresses instead of physical ones and stores the abstract model state explicitly in memory.  ... 
doi:10.3233/jcs-160558 fatcat:ugvovbh3brbcbahkgi5flgigrm

NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines

Vasily A. Sartakov, Rudiger Kapitza
2014 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks  
This issue is amplified by the ongoing trend of steadily growing in-memory state of Internetbased services which increases the risk of data loss and extends recovery time.  ...  NV-Hypervisor paves the way for utilizing NVRAM in virtualized environments (i.e., infrastructure-as-a-service clouds) and protects stateful services such as key-value stores and databases from data loss  ...  ACKNOWLEDGMENTS We would like to thank Thomas Knauth and anonymous reviewers for their helpful comments. Also we thank Bertil Munde and Viking Technology for access to hardware.  ... 
doi:10.1109/dsn.2014.64 dblp:conf/dsn/SartakovK14 fatcat:qohoclu4jjbfle7q7m46acqszq

The OKL4 microvisor

Gernot Heiser, Ben Leslie
2010 Proceedings of the first ACM asia-pacific workshop on Workshop on systems - APSys '10  
We argue that recent hypervisor-vs-microkernel discussions completely miss the point. Fundamentally, the two classes of systems have much in common, and provide similar abstractions.  ...  We assert that the requirements for both types of systems can be met with a single set of abstractions, a single design, and a single implementation.  ...  NICTA is funded by the Australian Government as represented by the Department of Broadband, Communications and the Digital Economy and the Australian Research Council through the ICT Centre of Excellence  ... 
doi:10.1145/1851276.1851282 dblp:conf/sigcomm/HeiserL10 fatcat:7nvoytnyvje7lpuovswpbdjpmi

A Survey of System Architectures and Techniques for FPGA Virtualization [article]

Masudul Hassan Quraishi, Erfan Bank Tavakoli, Fengbo Ren
2021 arXiv   pre-print
Therefore, the virtualization of FPGAs becomes extremely important to create a useful abstraction of the hardware suitable for application developers.  ...  Such abstraction also enables the sharing of FPGA resources among multiple users and accelerator applications, which is important because, traditionally, FPGAs have been mostly used in single-user, single-embedded-application  ...  In [75] , the authors propose a hypervisor named Optimus for a shared-memory FPGA platform.  ... 
arXiv:2011.09073v3 fatcat:iretcbvxf5hxherin2hskndvpy


Liang Gu, Alexander Vaynberg, Bryan Ford, Zhong Shao, David Costanzo
2011 Proceedings of the Second Asia-Pacific Workshop on Systems - APSys '11  
The kernel's API gives untrusted, provider-supplied management software control over allocation and delegation of resources such as memory and I/O devices, but prohibits management code from accessing  ...  Though attractive as a model for elastic on-demand service, cloud computing solutions based on existing hypervisors cannot guarantee that the provider will service a user's requests correctly, and will  ...  Any opinions, findings, and conclusions contained in this document are those of the authors and do not reflect the views of these agencies.  ... 
doi:10.1145/2103799.2103803 dblp:conf/apsys/GuVFSC11 fatcat:5rn3be34rbf2ra2ybaokvlmceu

Towards practical multikernel OSes with MySyS

Yauhen Klimiankou
2022 Proceedings of the 13th ACM SIGOPS Asia-Pacific Workshop on Systems  
In particular, multikernel OS constructs the system as a tightly-coupled distributed operating system consisting of a network of isolated nodes and interconnections between them.  ...  Furthermore, it replaces implicit inter-core communication through shared memory by explicit message passing and maintains a general OS state using replication.  ...  However, these programming models contradict sticking to SSI abstraction to a large extent and complicate porting of existing applications written for a shared memory environment.  ... 
doi:10.1145/3546591.3547525 fatcat:bo3omycbxzbvjaoufe6uqwnncy

Emerging Security Challenges of Cloud Virtual Infrastructure [article]

Amani S. Ibrahim, James Hamlyn-Harris, John Grundy
2016 arXiv   pre-print
Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet-based services allowing customers to remotely run and manage these services.  ...  Breaching the security of any component in the cloud virtual infrastructure significantly impacts on the security of other components and consequently affects the overall system security.  ...  Micro hypervisors include the necessary abstractions and management functions in the kernel mode (Ring 0), and their other functions and the device drivers are developed in an upper layer (Ring 1 or user-mode  ... 
arXiv:1612.09059v1 fatcat:7xiokklvcvffpli2rq2xyfacla
« Previous Showing results 1 — 15 out of 5,258 results