Harvesting Free Windows CPU Cycles for Linux Applications using Sandboxing Rasmus Andersen Dept. of Computer Science, University of Copenhagen, Denmark.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Virtualization Dr. Michael L. Collard
Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
NWCLUG 01/05/2010 Jared Moore Xen Open Source Virtualization.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
Overview Basic functions Features Installation: Windows host and Linux host.
Virtualization B. Ramamurthy. References Practical Virtualization Solutions: Virtualization from the Trenches by K. Hess and A. Newman, Prentice-Hall.
Virtualization for Cloud Computing
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
A Brief Introduction To Virtualization Technologies Yin Yunqiao HP.
LINUX Virtualization Running other code under LINUX.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
1 Virtualization and Virtual Machines Sarah Diesburg 1/10/2013 COP 5641.
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
Space Science and Engineering Center University of Wisconsin-Madison Virtual Machines: A method for distributing DB processing software Liam Gumley.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Condor Project Computer Sciences Department University of Wisconsin-Madison Virtual Machines in Condor.
A Survey on Virtualization Technologies
Methodologies, strategies and experiences Virtualization.
Tanenbaum 8.3 See references
Operating System Virtualization
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
A Survey on Virtualization Technologies. Virtualization is “HOT” Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM,
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Linux in a Virtual Environment Nagarajan Prabakar School of Computing and Information Sciences Florida International University.
VirtualBox What you need to know to build a Virtual Machine.
A study of introduction of the virtualization technology into operator consoles T.Ohata, M.Ishii / SPring-8 ICALEPCS 2005, October 10-14, 2005 Geneva,
First experience of submission to the EGEE/RDIG Grid of jobs prepared for non standart OSs by means of virtualization. I.Gorbunov, A.Kryukov SINP MSU,
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
02/09/2010 Industrial Project Course (234313) Virtualization-aware database engine Final Presentation Industrial Project Course (234313) Virtualization-aware.
Midterm Meeting Pete Bohman, Adam Kunk, Erik Shaw.
Installing Linux. Module 1 – Installing Linux ♦ Overview This module introduces you to the hardware and software terminology necessary to install a Linux.
Chapter 9: Networking with Unix and Linux. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Jaime Frey Computer Sciences Department University of Wisconsin-Madison Condor and Virtual Machines.
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Intro To Virtualization Mohammed Morsi
Virtualization Neependra Khare
INFSO-RI Enabling Grids for E-sciencE Workshop WLCG Security for Grid Sites Louis Poncet System Engineer SA3 - OSCT.
Welcome to the Virtual Machine Mark Cyzyk The Sheridan Libraries Johns Hopkins University.
VirtualBox Introduction:
Introduction to Operating Systems Concepts
Using Virtualization in the Classroom
Virtualization.
VMware ESX and ESXi Module 3.
Introduction to comp. and prog. CS 101 G 964
Fundamentals Sunny Sharma Microsoft
Operating System Review
Virtualization Dr. Michael L. Collard
Operating System Structure
Virtualization overview
Virtual Machines.
Running other code under LINUX
Hands-On Virtualization in the Classroom
Operating System Review
OS Virtualization.
Haiyan Meng and Douglas Thain
A Survey on Virtualization Technologies
Operating System Review
Virtual Operating Systems
Windows Virtual PC / Hyper-V
Chapter-1 Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions.
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Presentation transcript:

Harvesting Free Windows CPU Cycles for Linux Applications using Sandboxing Rasmus Andersen Dept. of Computer Science, University of Copenhagen, Denmark

Motivation ➢ One of the Grid promises: “Effectively share resources on an unprecedented scale“ But what about all those idle windows CPU cycles? ➢ We still need Screen Saver Science and a secure sandbox to provide us Linux cycles on idle windows CPU's

Basic Idea ➢ A sandbox provides an isolated environment in which applications can do no harm (ideally) ➢ So, we build our own linux iso-image, or modify an existing image, to fit our Grid, and run it in a sandbox. ➢ When the image is booted, it initiates itself as a Grid resource

MiG Introduction ➢ The MiG model:

Resource Requirements ➢ “Minimum intrusion” implies: No root install of software on the resource No requirements on the firewall configuration ➢ All we need is a local grid user and an ssh-connection ➢ Thus everything must run in user space

Sandbox Security Issues ➢ Security regarding executing applications in a Grid is two- ways: ➢ From resource owner POV: Am I affected by executing an unknown, possibly malicious, application? ➢ From user POV: Can I trust the application result from an unknown remote resource?

Sandbox Options: Emulator or Virtual Machine ➢ Emulation: ➢ Provides the desired CPU functionality in user space software by translating all instructions (=> performance drawback) ➢ Highly generic, one architecture can be emulated on a completely different architecture ➢ Bochs, Qemu, etc.

Sandbox Options: Emulator or Virtual Machine ➢ Virtualization: ➢ Direct, native execution by partitioning hardware into multiple contexts ➢ Not generic: Need specific hardware architecture! ➢ Runs in kernel space, thus insecure and intrusive (two kernels at the same protection level enables the guest kernel to compromise the host)) ➢ Xen, coLinux, etc.

Sandbox Options: Emulator or Virtual Machine ➢ A Hybrid, a user space virtual machine, is the best of both worlds: ➢ Qemu + accelerator module ➢ MS Virtual PC ➢ VMWare Player ➢ All proprietary products

Qemu ➢ Qemu is an open source emulator ➢ Runs on x86, x86_64, and PowerPC ➢ Emulates x86, x86_64, PowerPC, ARM, SPARC, and MIPS ➢ Supports many OSes (Linux, windows, Solaris, SkyOS, Minix). ➢ So, we build an MiG linux distribution to start in Qemu!

Requirements to the MiG Linux Distribution ➢ Take any working linux distro and add what's required in MiG: ➢ ssh and https/openssl ➢ In MiG, every participant must present himself with a certificate, and data transfers are handled using ssh. ➢ Hence, we built permant storage where we can put individual certificates and ssh-keys.

Work Flow ➢ When the screen saver starts, Qemu is initiated and the specified OS is booted ➢ During boot, the hard disk image file is mountet ➢ Finally, the MiG resource startup scripts are initiated, and the resource starts accepting linux jobs.

Execution Time ➢ When does the screen saver stop? ➢ MiG SSS module makes a guess ➢ Suspend and migrate? ➢ Not possible to suspend Qemu ➢ Mobile occam-pi processes can migrate

Conclusion ➢ The sandbox effectively uses idle windows CPU cycles ➢ Users can choose which sandbox they want ➢ The MiG linux distribution is working and occupies less than 3 MB, the user chooses the size of the hard disk image ➢ The host system cannot be compromized