Results 1 - 10
of
195
Subverting the Xen hypervisor
, 2008
"... Abstract — This paper outlines the recent work by the author to design and develop a backdoor for machines running the Xen hypervisor. An attacker can gain backdoor control over the host by overwriting Xen code and data structures; as not a single byte in dom0 domain is modified, the detection of su ..."
Abstract
-
Cited by 32 (0 self)
- Add to MetaCart
Abstract — This paper outlines the recent work by the author to design and develop a backdoor for machines running the Xen hypervisor. An attacker can gain backdoor control over the host by overwriting Xen code and data structures; as not a single byte in dom0 domain is modified, the detection
Collecting Provenance Via the Xen Hypervisor
- in The Third USENIX Workshop on the Theory and Practice of Provenance
, 2011
"... (Article begins on next page) The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Article begins on next page) The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.
Autonomic resource management for the Xen Hypervisor
"... Servers workload varies during time and they have to be able to support the maximum load rate during a day, hence, they are idle many time wating resources. A solu-tion to avoid this situation is having different servers with different workloads in the same computer in an isolated en-vironment and i ..."
Abstract
- Add to MetaCart
Servers workload varies during time and they have to be able to support the maximum load rate during a day, hence, they are idle many time wating resources. A solu-tion to avoid this situation is having different servers with different workloads in the same computer in an isolated en-vironment and it can be achieved with virtualization. Virtualization maximizes resources usage, nevertheless, virtual machines just competing for system resources is not a good solution in the real world. Providers needs to specify levels of service agreements with their users, like how many CPU percentage is guaranteed. In this case, introducing a manager that monitors resources usage and reallocates resources according to system load is necessary. In this ar-ticle, how many overhead introduces an external manager respect native virtual machine scheduling will be studied. If an application is underusing assigned resources, man-ager will reassign remaining resources between saturated applications taking into account SLAs.
Supporting soft real-time tasks in the xen hypervisor
- In ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE
, 2010
"... Virtualization technology enables server consolidation and has given an impetus to low-cost green data centers. However, current hypervisors do not provide adequate support for real-time applications, and this has limited the adoption of virtualization in some domains. Soft real-time applications, s ..."
Abstract
-
Cited by 23 (0 self)
- Add to MetaCart
Virtualization technology enables server consolidation and has given an impetus to low-cost green data centers. However, current hypervisors do not provide adequate support for real-time applications, and this has limited the adoption of virtualization in some domains. Soft real-time applications
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor
, 2013
"... In this technical report1, we describe how to enable live cloning [5] of virtual machines (VMs) with the help of the the Xen hypervisor [1]. In particular, we describe several modifications of the hypervisor’s code to enable live cloning of running VM’s and we show how to manage the cloned VM’s stor ..."
Abstract
- Add to MetaCart
In this technical report1, we describe how to enable live cloning [5] of virtual machines (VMs) with the help of the the Xen hypervisor [1]. In particular, we describe several modifications of the hypervisor’s code to enable live cloning of running VM’s and we show how to manage the cloned VM
Performance Isolation for Real-time Systems with Xen Hypervisor on Multi-cores
"... Abstract—Virtualization techniques are gaining significant interests in embedded real-time system design. However, exist-ing virtualization platforms lack strong performance isolation among virtual machines. In this work we propose a method to monitor and control the shared memory accesses of indivi ..."
Abstract
- Add to MetaCart
of individual virtual machines on multi-core processors with Xen hypervisor, to enhance the performance isolation among virtual machines and improve the timing predictability of real-time applications. Experiments with the SPEC2006 benchmark programs are conducted to validate the proposed method. I.
Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System
- In Proc. of ITNG 2011
, 2011
"... Abstract—In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen hypervisors to maintain the security of the cloud based on virtualized network. While the concept of virtual machine monitor (VMM) signifies implementing an abstraction layer between the underlying ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Abstract—In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen hypervisors to maintain the security of the cloud based on virtualized network. While the concept of virtual machine monitor (VMM) signifies implementing an abstraction layer between
Integrating Linux and the real-time ERIKA OS through the Xen hypervisor
"... Abstract—Modern user interfaces grow more and more com-plex and cannot be possibly handled by the same software components in charge of the timely execution of safety-critical control tasks. Evidence Srl recently proposed a single-board dual-OS system aimed at combining the flexibility of the Linux ..."
Abstract
- Add to MetaCart
should be isolated from each other. In this paper we present, as an improvement to the initial implementation, again a double-OS system running, on a dual-core platform, ERIKA Enterprise and a full-featured Linux OS, but using the Xen hypervisor to run the two operating systems in two isolated domains
Abstract Performance Isolation for Mixed Criticality Real-time System on Multicore with Xen Hypervisor
"... Multicore processors have imported the powerful computing capacity to real-time systems, allowing the multi-task execution on the co-running cores. Meanwhile, the competition for the shared resources among the on-die cores brings the side-effects which highly degrades the performance of single cores ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
of critical tasks. We implemented the throttling framework on Xen Hypervisor and evaluated the overall isolating performance with a set of benchmarks. The results prove the effectiveness of our design.
Research on system virtualization using xen hypervisor for arm based secure mobile phones,” Seminar ’Security
- Berlin University of Technology
, 2010
"... Mobile phones became the prevailing application in embedded devices. As its market is getting bigger, its security is becoming an important issues. Xen as a virtualization technology could be one of its solutions with domain protection mechanism. Recently, Xen community released the interesting patc ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger, its security is becoming an important issues. Xen as a virtualization technology could be one of its solutions with domain protection mechanism. Recently, Xen community released the interesting
Results 1 - 10
of
195