UMview: View-OS implemented as a System Call Virtual Machine
نویسندگان
چکیده
One component of the Virtual Square framework[12, 3, 4], is View-OS. Traditional OS’s implement the global view assumption: any two processes running on a computer share the same view of their execution environment. This “global” view includes the meaning of pathnames, network stacks, routing rules, devices etc. While processes may have different permissions to access these resources, the naming scheme is the same. View-OS removes the global view assumption. Each process in View-OS has its own view of the execution environment, i.e. its own view of the networking system, file systems, existing devices, inter-process communication, etc. Furthermore, process view redefinition in View-OS can be selectively applied to specific portions of a processes’ view: e.g. a process can change its view of the file system, or only on a subtree of the file system. UMview is a user-mode implementation of key View-OS concepts as a partial, modular, system call virtual machine (SCVM). A SCVM is a process-virtual machine[10, 11] where processes run natively on the processor and just the system calls are virtualized. User-Mode Linux (UML)[5, 6], whose virtual monitor is an entire linux kernel loaded as a process, is the canonical example of a SCVM. UMview is a partial SCVM since it is possible to provide a process with a view which is a mix of virtual and native entities. For example, UMview supports the mounting of a virtual filesystem. Afterwards, the processes’ view of the filesystem is composed of a virtual subtree rooted at the mountpoint, in addition to the pre-existing filesystem. Unlike traditional kernel mounts, UMview mount effects are limited to the processes running in the virtual machine. Furthermore, view modification actions, like the mount operation example, can be nested. UMview is a modular SCVM. Loadable modules provide suitable abstractions for supporting specific virtualizations: e.g. file systems, devices, networking systems, etc. UMview provides a flexible and general purpose support for virtualization. Using the View-OS concepts implemented as UMview modules one can “unify” several pre-existing models of virtualization.
منابع مشابه
Temperature-aware virtual machine in Para Virtualization Cloud Environment
This paper describes the Para virtualization which involves modification of a guest operating system (OS). Today this method is only supported for open source operating systems, limiting its applicability. However, par virtualization provides higher performance than full virtualization in performance because it does not need to trap and translate every OS call. Here temperature aware virtual ma...
متن کاملDesign and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment
In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization ...
متن کاملSevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
Stuxnet worm opened a new era in cybersecurity. This heavily networking virus implemented a new threat: it infects industrial control systems; consequences of the infection might be as gravy as a technogenic catastrophe. Stuxnet performs networking to communicate between instances, contact so called “Stuxnet command and control center”, and upload malicious code to real-time controllers. The vi...
متن کاملLeveraging derivative virtual machine introspection methods for security applications
Virtual machine introspection (VMI) describes the method of monitoring, analyzing, and manipulating the state of a virtual machine from the hypervisor level. This lends itself to many security applications, though they all share a single fundamental challenge: One must address the fact that the hypervisor has no semantic knowledge about what the system state means (e. g., where key data structu...
متن کاملSplitting Interfaces : Making Trust Between Applications and Operating Systems Configurable by Richard Ta - Min
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable Richard Ta-Min Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2006 In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
متن کامل