1 virtualization prof. ravi sandhu executive director and endowed chair february 7, 2014...
TRANSCRIPT
1
Virtualization
Prof. Ravi SandhuExecutive Director and Endowed Chair
February 7, 2014
© Ravi Sandhu World-Leading Research with Real-World Impact!
CS 6393 Lecture 3
© Ravi Sandhu 2World-Leading Research with Real-World Impact!
1. Smith, J.E. and Nair, R., The Architecture of Virtual Machines," IEEE Computer , vol.38, no.5, pp.32-38, May 2005.
2. SCOPE Alliance. Virtualization: State of the Art. Version 1.0, April 3, 2008. 18 pages.
3. Gabor Pik, Levente Buttyan, and Boldizsar Bencsath. 2013. A survey of security issues in hardware virtualization. ACM Comput. Surv. 45, 3, Article 40 (July 2013), 34 pages.
© Ravi Sandhu 3World-Leading Research with Real-World Impact!
© Ravi Sandhu 4World-Leading Research with Real-World Impact!
© Ravi Sandhu 5World-Leading Research with Real-World Impact!
User ISAPrivileged ISA
System Calls
API
© Ravi Sandhu 6World-Leading Research with Real-World Impact!
ABI or API level
ISA level
Process VM
System VM
© Ravi Sandhu 7World-Leading Research with Real-World Impact!
Java VM, Microsoft CLIHP Dynamo
Most OS’s VM/370, Xen
VMWare GSX, KVM
Virtual PC
Transmeta Crusoe
Intel IA32-EL
© Ravi Sandhu 8World-Leading Research with Real-World Impact!
© Ravi Sandhu 9World-Leading Research with Real-World Impact!
© Ravi Sandhu 10World-Leading Research with Real-World Impact!
Java VM, Microsoft CLIHP Dynamo
Most OS’s VM/370, Xen
VMWare GSX, KVM
Virtual PC
Transmeta Crusoe
Intel IA32-EL
© Ravi Sandhu 11World-Leading Research with Real-World Impact!
© Ravi Sandhu 12World-Leading Research with Real-World Impact!
© Ravi Sandhu 13World-Leading Research with Real-World Impact!
© Ravi Sandhu 14World-Leading Research with Real-World Impact!
Requires modification to Guest OS to replaceprivileged instructions by hypercalls to VMM