1 Virtualization Prof. Ravi Sandhu Executive Director and Endowed Chair February 7, 2014 © Ravi Sandhu World-Leading.

Slides:



Advertisements
Similar presentations
Virtualization Dr. Michael L. Collard
Advertisements

1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 Authentication with Passwords Prof. Ravi Sandhu Executive Director and Endowed Chair February 1, © Ravi.
1 Federated Identity and Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 15, 2013
1 Privacy in Microdata Release Prof. Ravi Sandhu Executive Director and Endowed Chair March 22, © Ravi Sandhu.
Attribute-Based Access Control Models and Beyond
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
ELEC6200, Fall 07, Oct 29 Westrom: Virtual Machines 1 Kenneth Westrom ELEC-6620.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
Zen and the Art of Virtualization Paul Barham, et al. University of Cambridge, Microsoft Research Cambridge Published by ACM SOSP’03 Presented by Tina.
Virtual Machines: Versatile Platforms for Systems and Processes
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
Operating System Support for Virtual Machines Samuel T. King, George W. Dunlap,Peter M.Chen Presented By, Rajesh 1 References [1] Virtual Machines: Supporting.
Virtualization Concepts Presented by: Mariano Diaz.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Introduction 1-1 Introduction to Virtual Machines From “Virtual Machines” Smith and Nair Chapter 1.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
CS533 Concepts of Operating Systems Jonathan Walpole.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
資工系網媒所 NEWS 實驗室 /450 What is Virtualization ? etc Virtualization Running Applications (x-platform) Running Applications (x-platform) Security Sharing Hardware.
Introduction Why are virtual machines interesting?
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor July 27, 2011
6/13/20161 Operating Systems Design (CS 423) Elsa L Gunter 2112 SC, UIUC Based on slides by Roy Campbell, Sam King,
1 Views of Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair March 25, © Ravi Sandhu.
1 Provenance-Based Access Control (PBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair April 15, 2016
Virtual Machines (part 2) CPS210 Spring Papers  Xen and the Art of Virtualization  Paul Barham  ReVirt: Enabling Intrusion Analysis through Virtual.
Kernel-based Virtual Machine (KVM) Memory Management Unit (MMU) Virtualization Mohammad H. Mofrad February 11, 2016
1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same.
CS 695 Topics in Virtualization and Cloud Computing, Autumn 2012 CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Virtualization Dr. Michael L. Collard
Institute for Cyber Security
Virtual Machines: Versatile Platforms for Systems and Processes
Operating Systems Design (CS 423)
Security and Privacy in the Networked World
CS 140 Lecture Notes: Virtual Machines
Authentication by Passwords
Identity and Access Control in the
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Virtualization Techniques
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
CS 140 Lecture Notes: Virtual Machines
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Virtual machines benefits
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Challenge-Response Authentication
Introduction to Virtual Machines
Introduction to Virtual Machines
Cyber Security Research: Applied and Basic Combined*
CS 140 Lecture Notes: Virtual Machines
Attribute-Based Access Control (ABAC)
World-Leading Research with Real-World Impact!
Presentation transcript:

1 Virtualization Prof. Ravi Sandhu Executive Director and Endowed Chair February 7, © Ravi Sandhu World-Leading Research with Real-World Impact! CS 6393 Lecture 3

© Ravi Sandhu 2 World-Leading Research with Real-World Impact! 1.Smith, J.E. and Nair, R., The Architecture of Virtual Machines," IEEE Computer, vol.38, no.5, pp.32-38, May SCOPE Alliance. Virtualization: State of the Art. Version 1.0, April 3, pages. 3.Gabor Pik, Levente Buttyan, and Boldizsar Bencsath A survey of security issues in hardware virtualization. ACM Comput. Surv. 45, 3, Article 40 (July 2013), 34 pages.

© Ravi Sandhu 3 World-Leading Research with Real-World Impact!

© Ravi Sandhu 4 World-Leading Research with Real-World Impact!

© Ravi Sandhu 5 World-Leading Research with Real-World Impact! User ISAPrivileged ISA System Calls API

© Ravi Sandhu 6 World-Leading Research with Real-World Impact! ABI or API level ISA level Process VM System VM

© Ravi Sandhu 7 World-Leading Research with Real-World Impact! Java VM, Microsoft CLIHP Dynamo Most OS’sVM/370, Xen VMWare GSX, KVM Virtual PC Transmeta Crusoe Intel IA32-EL

© Ravi Sandhu 8 World-Leading Research with Real-World Impact!

© Ravi Sandhu 9 World-Leading Research with Real-World Impact!

© Ravi Sandhu 10 World-Leading Research with Real-World Impact! Java VM, Microsoft CLIHP Dynamo Most OS’sVM/370, Xen VMWare GSX, KVM Virtual PC Transmeta Crusoe Intel IA32-EL

© Ravi Sandhu 11 World-Leading Research with Real-World Impact!

© Ravi Sandhu 12 World-Leading Research with Real-World Impact!

© Ravi Sandhu 13 World-Leading Research with Real-World Impact!

© Ravi Sandhu 14 World-Leading Research with Real-World Impact! Requires modification to Guest OS to replace privileged instructions by hypercalls to VMM