Hypervisors and Next Generation Virtualization William Strickland COT4810 Spring 2008 February 7, 2008.

Slides:



Advertisements
Similar presentations
Virtualization Dr. Michael L. Collard
Advertisements

Virtualization Technology
Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
V IRTUALIZATION A TTACKS Undetectable Bluepill. V IRTUALIZATION AND ITS A TTACKS What is Virtualization? What makes it possible? How does it affect security?
Network Implementation for Xen and KVM Class project for E : Network System Design and Implantation 12 Apr 2010 Kangkook Jee (kj2181)
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
ELEC6200, Fall 07, Oct 29 Westrom: Virtual Machines 1 Kenneth Westrom ELEC-6620.
Virtual Machines. Virtualization Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system”
Virtualization for Cloud Computing
LINUX Virtualization Running other code under LINUX.
Distributed Systems CS Virtualization- Overview Lecture 22, Dec 4, 2013 Mohammad Hammoud 1.
A Survey on Virtualization Technologies
Virtual Machine Monitors. Bibliography 1.“Virtual Machine Monitors: Current Technology And Future Trends”, Mendel Rosenblum and Tal Garfinkel, IEEE Computer,
Tanenbaum 8.3 See references
Operating System Virtualization
Zen and the Art of Virtualization Paul Barham, et al. University of Cambridge, Microsoft Research Cambridge Published by ACM SOSP’03 Presented by Tina.
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
An Introduction to Xen Prof. Chih-Hung Wu
VMs Virtual Machines. VM What is a VM  Virtual Machine  Software implementation of a machine running on another machine The VM may or may not resemble.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
A Survey on Virtualization Technologies. Virtualization is “HOT” Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM,
Virtualization Concepts Presented by: Mariano Diaz.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Virtualization: Not Just For Servers Hollis Blanchard PowerPC kernel hacker.
Introduction 1-1 Introduction to Virtual Machines From “Virtual Machines” Smith and Nair Chapter 1.
Virtual Machine and its Role in Distributed Systems.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Secure Operating Stuff Lesson “like” 7 (a): Virtualization.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Cloud Operating System Unit 09 Cloud OS Core Technology M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung,
A Discussion. * Used Since1960’s starting with IBM System/360 * Grown in acceptance and usage by non Mainframe or “Big Iron” Environments only in recent.
Midterm Meeting Pete Bohman, Adam Kunk, Erik Shaw.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Consolidate and Virtualize your Linux Environment M.S.Anand │ Technology.
Full and Para Virtualization
Operating-System Structures
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
VMM Based Rootkit Detection on Android
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Overview of Virtualization The magic of virtual machines Borislav Varadinov Telerik Software Academy System Administrator Marian.
Virtualization Neependra Khare
1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same.
Virtualization for Cloud Computing
VIRTUALIZATION.
Virtualization.
Virtualization D. J. Foreman 2009.
Virtualization Technology
Virtualization Dr. Michael L. Collard
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Virtualization overview
Virtual Servers.
Running other code under LINUX
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
OS Virtualization.
Virtualization Techniques
A Survey on Virtualization Technologies
Virtual machines benefits
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Shielding applications from an untrusted cloud with Haven
Introduction to Virtual Machines
Introduction to Virtual Machines
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Presentation transcript:

Hypervisors and Next Generation Virtualization William Strickland COT4810 Spring 2008 February 7, 2008

Overview Origins Details Typical Usage Dark Side Darker Still In Better Hands

Origins Hypervisor also known as Virtual Machine Monitor. Software emulating hardware to operating systems. First developed for Servers and Mainframes by IBM. Due to plentiful hardware not widely used, but fundamental method of virtualization.

Details: Native Hypervisor Hypervisor directly on top of hardware. Emulates hardware to operating systems. Difficult to implement.

Details: Hosted Hypervisor Runs under host operating system. Easier to implement. Less efficient.

Details: x86 Architecture Instruction levels (rings) 0 to 3. Operating Systems use lowest ring (ring 0). Hardware does not support virtualization.

Details: x86 Virtualization Support traditionally from layers of software to emulate privileged commands. Recent additions by AMD and Intel provide Virtualization support of hypervisors. Hypervisor code runs below operating systems and assumes control of hardware.

Details: OS Paravirtualization Operating system to be virtualized is modified with hypervisor awareness. Avoids using commands that must be emulated, thus improving performance. Simplifies Hypervisor design and implementation.

Typical Usage Machine Consolidation - More machines in one, for mutually exclusive function. Sandboxing – performing dangerous actions in contained environment. Whole System Mobility – moving whole system around.

Dark side: VM rootkit Whole OS can be under command of software entity. Concerns  Cross platform.  No way to breach VM. Limitations  On typical x86 hardware, hard to put an incumbent operating system into VM.  Can detect if running in VM.

Darker Still: Blue Pill New hardware support of hypervisors allows machine to be subverted much more easily. Concerns  Act as stealthier rootkit.  Hypervisor invisible to rest of system. Limitations  Limited targets.  Can be detected, probably.

Typical Rootkit

Hypervisor Rootkit

In Better Hands Enforce Kernel protection; stop kernel hooking. Prevent rootkits (including hypervisor based). Better security implementation allowing more isolation of critical systems.

References “Blue Pill” August 24, Podcast. “Security Now!.” grc.com. 27 August Dorman, Andy. "Intel VT vs. AMD Pacifica." IT Architect Nov 2005: Greene, Jay. "Microsoft Revives Virtualization Push." Business Week Online 23 Jan 2008: 28. Marshall, David, Wade A. Reynolds, and Dave McCrory. Advanced Server Virtualization. Boca Raton, FL: Auerbach Publications, Popek, Gerald J., and Robert P. Goldberg. "Formal requirements for virtualizable third generation architectures." Communications of the ACM 17.7(1974): Rosenblum, Mendel, and Tal Garfinkel. "Virtual Machine Monitors: Current Technology and Future Trends." Computer 38.5(2005): Vaas, Lisa. "Blue Pill at Black Hat." eWeek 13 June 2007: 10. Whitaker, Andrew, et al. Gribble."Rethinking the Design of Virtual Machine Monitors." Computer 38.5(2005):

Questions At what ring does the kernel of a 32-bit x86 operating system run? True or false, paravirtualization can run improve performance of an unmodified operating system?