Virtualization Device Emulator Testing Technology. Speaker: Qinghao Tang Title 360 Marvel Team Leader

Size: px
Start display at page:

Download "Virtualization Device Emulator Testing Technology. Speaker: Qinghao Tang Title 360 Marvel Team Leader"

Transcription

1 Virtualization Device Emulator Testing Technology Speaker: Qinghao Tang Title 360 Marvel Team Leader 1

2 360 Marvel Team Established in May 2015, the first professional could computing and virtualization security team in China. Focusing on attack and defense techniques in virtualization system. fuzzing framework guest machine escape technology Hypervisor risk defense technology 2

3 Agenda Virtualization System Attack Surface Fuzzing framework Case study 3

4 Virtualization System Attack Surface 4

5 Cloud Computing 5

6 Hypervisor Types function Xen Kvm Vmware quantizing distribution flexible scheduling 6

7 Distinctions OS Guest OS Hardware emulator Guest OS Hardware emulator Hypervisor Physical Devices Normal Server Physical Devices Virtualization Server 7

8 Attacking Processes in cloud computing 1. Enter VM via web or other devices 2. Exploit virtualization system vulnerabilities to escape VM 3. lateral movements to others VMs on host 4. Access to host network 8

9 Operation Principles of device emulators 9

10 The attack surface Hardware virtualization components diversity Qemu 30+ Vmware 20+ Bridge between inside-outside VM os -> device emulators -> Host os Related Vulnerabilities result big dangers Limitation 10

11 Fuzzing Framework 11

12 Basic intro Attack surface hardware virtual components Environment qemu vmware Testing results more than 20 vulnerabilities Challenges lower layers hard to predict Trends more attack surfaces more kinds of virtualization systems 12

13 Compare to traditional targets Hardware virtualization focus on lower layers System Kernel Hypervisor Testing data totally different 13

14 Methods for testing hardware virtual components 1. Analyze data which flowed to components 2. Change flowed-in data s contents and timing 3. Recording all of tiny abnormal activities 4. Analyze abnormal activities, takes and optimize fuzz framework. 14

15 Other factors of fuzz framework 1.Flexibility (other OS) vm in Linux coding in C and Python 2. Deeply understand VM system language for coding development environment coding style 15

16 Fuzz framework structure Control Center os os os os os os Host Host 16

17 Fuzz framework working flow (part 1) 1. Set up network and hardware environment, launch server, client and monitor. 2. Load system hook module, get all of machines device emulators 3. Client ask server for testing data of emulators, server send out required data. 4. Client received and loaded testing data, launch test. 5. Monitor continually monitor hypervisor, and record logs. 17

18 Fuzz framework working flow (part 2) 6. Notify the server after client testing finished 7. Server get logs from client and monitor, save it. 8. Server launch log analyze module, determine if anything wrong happened, and notify admins. 9. Analyze program exceptions, optimize fuzz framework 18

19 Functions of controlling center 19

20 Get target components info 20

21 Testing data Device access ports Device deal with structures used by data. Device data processing 21

22 Testing data attacks User space: generate testing dat, send request to client kernel Kernel space: apply for memory, fill memory, send info to ports Device emulator testing data flow user space Kernel space Device controller inside trigger exceptions 22

23 Monitor VM management Snapshot Reboot VM device editing Dynamic debugging Debugging Mode on Start Load Debugging Plugin VM processing log User space Kernel space 23

24 Exceptions occur in device emulator VM os crash Hypervisor crash Invisible results 24

25 Advanced monitoring skills Dynamic Static 25

26 Optimize fuzz framework by using log data Client log Decrease invalid combinations Monitor log Promote coverage Server log 26

27 Vulnerabilities found by us 27

28 Case Study 28

29 Principle of e1000 Network Device Initialization Port Allocation Address Mapping Device Status Setting, Resource Allocation Data Transfer 'Write Command' to device TDT register process of descriptor 3 types descriptor context data legacy data xfer set status wait for next instruction Processing Details Circular Memory TSO tcp segmentation/flow control. 29

30 E1000 vulnerability analysis Qemu e1000 Network Device Vmware e1000 Network Device 30

31 Pcnet network card emulator working processes Io port write Control and Status Registers write Receive Send Virtual Network Interface 31

32 Pcnet vulnerability analysis Qemu pcnet Network Device 32

33 Summary Stay tuned for more achievements by 360 Marvel Team 33

34 Q & A tangqinghao@360.cn QQ

64-bit ARM Unikernels on ukvm

64-bit ARM Unikernels on ukvm 64-bit ARM Unikernels on ukvm Wei Chen Senior Software Engineer Tokyo / Open Source Summit Japan 2017 2017-05-31 Thanks to Dan Williams, Martin Lucina, Anil Madhavapeddy and other Solo5

More information

Virtualization. ...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania.

Virtualization. ...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania. Virtualization...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania April 6, 2009 (CIS 399 Unix) Virtualization April 6, 2009 1 / 22 What

More information

MASSIVE SCALE USB DEVICE DRIVER FUZZ WITHOUT DEVICE. HC Tencent s XuanwuLab

MASSIVE SCALE USB DEVICE DRIVER FUZZ WITHOUT DEVICE. HC Tencent s XuanwuLab MASSIVE SCALE USB DEVICE DRIVER FUZZ WITHOUT DEVICE HC Ma @ Tencent s XuanwuLab whoami Security Researcher@ Used to doing Chemistry; Interested in: Console Hacking; Embedded Device Security; Firmware Reverse

More information

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017 Hypervisor security Evgeny Yakovlev, DEFCON NN, 2017 whoami Low-level development in C and C++ on x86 UEFI, virtualization, security Jetico, Kaspersky Lab QEMU/KVM developer at Virtuozzo 2 Agenda Why hypervisor

More information

Virtually Impossible

Virtually Impossible Virtually Impossible The Reality of Virtualization Security Gal Diskin / Chief Research Officer / Cyvera LTD. /WhoAmI? Chief Research Officer @ Cvyera LTD Formerly Security Evaluation Architect of the

More information

Escape from VMware Worksta2on by using "Hearthstone"

Escape from VMware Worksta2on by using Hearthstone Escape from VMware Worksta2on by using "Hearthstone" About Marvel Team Focus on virtualization security, 2015.6-2016.6 fuzz qemu and xen and report 30+ vuls Report cve-2016-3710, the first one can be used

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

CrashOS: Hypervisor testing tool

CrashOS: Hypervisor testing tool ISSRE 2017 Anaïs GANTET - Airbus Digital Security October 2017 Outline 1 Why CrashOS? 2 CrashOS presentation 3 Vulnerability research and results October 2017 2 ISSRE Outline 1 Why CrashOS? 2 CrashOS presentation

More information

Secure Containers with EPT Isolation

Secure Containers with EPT Isolation Secure Containers with EPT Isolation Chunyan Liu liuchunyan9@huawei.com Jixing Gu jixing.gu@intel.com Presenters Jixing Gu: Software Architect, from Intel CIG SW Team, working on secure container solution

More information

Continuous integration & continuous delivery. COSC345 Software Engineering

Continuous integration & continuous delivery. COSC345 Software Engineering Continuous integration & continuous delivery COSC345 Software Engineering Outline Integrating different teams work, e.g., using git Defining continuous integration / continuous delivery We use continuous

More information

Malware

Malware reloaded Malware Research Team @ @xabiugarte Motivation Design principles / architecture Features Use cases Future work Dynamic Binary Instrumentation Techniques to trace the execution of a binary (or

More information

DOUG GOLDSTEIN STAR LAB XEN SUMMIT AUG 2016 ATTACK SURFACE REDUCTION

DOUG GOLDSTEIN STAR LAB XEN SUMMIT AUG 2016 ATTACK SURFACE REDUCTION DOUG GOLDSTEIN STAR LAB XEN SUMMIT 2016 25 AUG 2016 ATTACK SURFACE REDUCTION OVERVIEW TOPICS Define attack surface Discuss parts of Xen s attack surface Attack surface metrics for Xen Define attack surface

More information

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,

More information

A Userspace Packet Switch for Virtual Machines

A Userspace Packet Switch for Virtual Machines SHRINKING THE HYPERVISOR ONE SUBSYSTEM AT A TIME A Userspace Packet Switch for Virtual Machines Julian Stecklina OS Group, TU Dresden jsteckli@os.inf.tu-dresden.de VEE 2014, Salt Lake City 1 Motivation

More information

The Role of Networking in a Virtualized World Sponsor Technology Roadmap. Kevin Ryan Director Data Center Solutions

The Role of Networking in a Virtualized World Sponsor Technology Roadmap. Kevin Ryan Director Data Center Solutions The Role of Networking in a Virtualized World Sponsor Technology Roadmap Kevin Ryan Director Data Center Solutions www.extremenetworks.com Data Center Trends The New Computer Data center capacity, not

More information

SUSE An introduction...

SUSE An introduction... Virtualization @ SUSE An introduction... Mike Latimer Sr. Engineering Manager SUSE mlatimer@suse.com Agenda Who is SUSE? Introduction to Virtualization Types of Hypervisors Xen KVM libvirt Virtualization

More information

RUNNING VTVAX FOR WINDOWS IN A VIRTUAL MACHINE ENVIRONMENT

RUNNING VTVAX FOR WINDOWS IN A VIRTUAL MACHINE ENVIRONMENT RUNNING VTVAX FOR WINDOWS IN A VIRTUAL MACHINE ENVIRONMENT TECHNICAL NOTE WN-0001-05 AVT/Vere Technical Note: Running vtvax for Windows in a Virtual Machine Environment WN-0001-05 (October, 2018) 2018

More information

CIT 480: Securing Computer Systems. Operating System Concepts

CIT 480: Securing Computer Systems. Operating System Concepts CIT 480: Securing Computer Systems Operating System Concepts Topics 1. What is an OS? 2. Processes 3. Memory management 4. Filesystems 5. Virtual machines A Computer Model An operating system has to deal

More information

Xen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems

Xen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems Xen and CloudStack Ewan Mellor Director, Engineering, Open-source Cloud Platforms Citrix Systems Agenda What is CloudStack? Move to the Apache Foundation CloudStack architecture on Xen The future for CloudStack

More information

Making Dynamic Instrumentation Great Again

Making Dynamic Instrumentation Great Again Making Dynamic Instrumentation Great Again Malware Research Team @ @xabiugarte [advertising space ] Deep Packer Inspector https://packerinspector.github.io https://packerinspector.com Many instrumentation

More information

CS 550 Operating Systems Spring Introduction to Virtual Machines

CS 550 Operating Systems Spring Introduction to Virtual Machines CS 550 Operating Systems Spring 2018 Introduction to Virtual Machines 1 How to share a physical computer Operating systems allows multiple processes/applications to run simultaneously Via process/memory

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a

More information

Extended Page Tables (EPT) A VMM must protect host physical memory Multiple guest operating systems share the same host physical memory VMM typically implements protections through page-table shadowing

More information

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following: CS 470 Spring 2018 Mike Lam, Professor Virtualization and Cloud Computing Content taken from the following: A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, 9 th Edition (Chapter

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Click to edit Master subtitle. Virtual Machines Module 2

Click to edit Master subtitle. Virtual Machines Module 2 Air Force Association s CyberPatriot Click to The National edit High Master School Cyber Defense title Competition style Click to edit Master subtitle style Virtual Machines Module 2 GCCS Definitions Objectives

More information

VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR. Xen Hypervisor. User Guide

VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR. Xen Hypervisor. User Guide VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR Xen Hypervisor User Guide TABLE OF CONTENTS 1. Purpose... 3 2. Introduction to the Management Pack... 3 2.1 How the Management Pack Collects Data... 3 2.2

More information

Lab 6: OS Security for the Internet of Things

Lab 6: OS Security for the Internet of Things Department of Computer Science: Cyber Security Practice Lab 6: OS Security for the Internet of Things Introduction The Internet of Things (IoT) is an emerging technology that will affect our daily life.

More information

Lab 6: OS Security for the Internet of Things

Lab 6: OS Security for the Internet of Things Department of Computer Science: Cyber Security Practice Lab 6: OS Security for the Internet of Things Introduction The Internet of Things (IoT) is an emerging technology that will affect our daily life.

More information

Intel Graphics Virtualization on KVM. Aug KVM Forum 2011 Rev. 3

Intel Graphics Virtualization on KVM. Aug KVM Forum 2011 Rev. 3 Intel Graphics Virtualization on KVM Aug-16-2011 allen.m.kay@intel.com KVM Forum 2011 Rev. 3 Agenda Background on IO Virtualization Device Operation on Native Platform QEMU IO Virtualization Device Direct

More information

CSC 5930/9010 Cloud S & P: Virtualization

CSC 5930/9010 Cloud S & P: Virtualization CSC 5930/9010 Cloud S & P: Virtualization Professor Henry Carter Fall 2016 Recap Network traffic can be encrypted at different layers depending on application needs TLS: transport layer IPsec: network

More information

Micro VMMs and Nested Virtualization

Micro VMMs and Nested Virtualization Micro VMMs and Nested Virtualization For the TCE 4th summer school on computer security, big data and innovation Baruch Chaikin, Intel 9 September 2015 Agenda Virtualization Basics The Micro VMM Nested

More information

Virtual Machine Virtual Machine Types System Virtual Machine: virtualize a machine Container: virtualize an OS Program Virtual Machine: virtualize a process Language Virtual Machine: virtualize a language

More information

Chapter 5 C. Virtual machines

Chapter 5 C. Virtual machines Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing

More information

Module 1: Virtualization. Types of Interfaces

Module 1: Virtualization. Types of Interfaces Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform

More information

Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy

Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy SESSION ID: CSV-W01 Bryan D. Payne Director of Security Research Nebula @bdpsecurity Cloud Security Today Cloud has lots of momentum

More information

MultiNyx: A Multi-Level Abstraction Framework for Systematic Analysis of Hypervisors. Pedro Fonseca, Xi Wang, Arvind Krishnamurthy

MultiNyx: A Multi-Level Abstraction Framework for Systematic Analysis of Hypervisors. Pedro Fonseca, Xi Wang, Arvind Krishnamurthy MultiNyx: A Multi-Level Abstraction Framework for Systematic Analysis of Hypervisors Pedro Fonseca, Xi Wang, Arvind Krishnamurthy Hypervisor correctness is critical Hypervisors need to virtualize correctly

More information

Towards a configurable and slimmer x86 hypervisor

Towards a configurable and slimmer x86 hypervisor Towards a configurable and slimmer x86 hypervisor Liu Wei Budapest July 11-13, 2017 Current state of affairs PV mode: no hardware extension needed, used in legacy systems, useful in certain cases like

More information

MWR InfoSecurity Security Advisory. Linux USB Device Driver - Buffer Overflow. 29 th October Contents

MWR InfoSecurity Security Advisory. Linux USB Device Driver - Buffer Overflow. 29 th October Contents Contents MWR InfoSecurity Security Advisory Linux USB Device Driver - Buffer Overflow 29 th October 2009 2009-10-29 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 4 1.1 Technical

More information

Advanced Exploitation: Xen Hypervisor VM Escape

Advanced Exploitation: Xen Hypervisor VM Escape Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team 1 Who am I? 2014-2015 at Vulnhunt Security Team for APT Defense 2015 - now at Alibaba Cloud

More information

Cloud Computing Virtualization

Cloud Computing Virtualization Cloud Computing Virtualization Anil Madhavapeddy anil@recoil.org Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. x86 support for virtualization. Full and

More information

Open-source library and tools to support the OVF.

Open-source library and tools to support the OVF. Open OVF Proposal Open-source library and tools to support the OVF http://xml.coverpages.org/ni2007-09-11-a.html IBM will be donating code and invites all to form an open community around OVF Eclipse Public

More information

W11 Hyper-V security. Jesper Krogh.

W11 Hyper-V security. Jesper Krogh. W11 Hyper-V security Jesper Krogh jesper_krogh@dell.com Jesper Krogh Speaker intro Senior Solution architect at Dell Responsible for Microsoft offerings and solutions within Denmark Specialities witin:

More information

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud SaaSaMe Transport Workload Snapshot Export for Alibaba Cloud Contents About This Document... 3 Revision History... 3 Workload Snapshot Export for Alibaba Cloud... 4 Workload Snapshot Export Feature...

More information

Privilege Escalation

Privilege Escalation Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended

More information

Virtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.

Virtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Virtual Machines Part 2: starting 19 years ago Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Operating Systems In Depth IX 2 Copyright 2018 Thomas W. Doeppner.

More information

Using VMware Player 3.0 with USB Pocket Hard Drive For IT Curriculum

Using VMware Player 3.0 with USB Pocket Hard Drive For IT Curriculum Using VMware Player 3.0 with USB Pocket Hard Drive For IT Curriculum Salient Features Virtual machines stored on the USB Portable Hard Drive can be carried from one computer to another as long as the same

More information

A Hardware-Assisted Virtualization Based Approach on How to Protect the Kernel Space from Malicious Actions

A Hardware-Assisted Virtualization Based Approach on How to Protect the Kernel Space from Malicious Actions A Hardware-Assisted Virtualization Based Approach on How to Protect the Kernel Space from Malicious Actions Eric Lacombe 1 Ph.D Supervisors: Yves Deswarte and Vincent Nicomette 1 eric.lacombe@security-labs.org

More information

Qiang Li && Zhibin Hu/Qihoo 360 Gear Team Ruxcon 2016

Qiang Li && Zhibin Hu/Qihoo 360 Gear Team Ruxcon 2016 Qiang Li && Zhibin Hu/Qihoo 360 Gear Team Ruxcon 2016 Who are we Security researcher in Qihoo 360 Inc(Gear Team) Vulnerability discovery and analysis Specialize in QEMU currently 50+ security issues, 33

More information

EE 660: Computer Architecture Cloud Architecture: Virtualization

EE 660: Computer Architecture Cloud Architecture: Virtualization EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar

More information

Virtual Machines. Module 2

Virtual Machines. Module 2 Virtual Machines Module 2 Define virtual machine Objectives Define common terminology Identify advantages and disadvantages Determine what software is needed; how to download and install that software

More information

Back To The Future: A Radical Insecure Design of KVM on ARM

Back To The Future: A Radical Insecure Design of KVM on ARM Back To The Future: A Radical Insecure Design of KVM on ARM Abstract In ARM, there are certain instructions that generate exceptions. Such instructions are typically executed to request a service from

More information

Simulating Networks Using Cisco Modelling Labs

Simulating Networks Using Cisco Modelling Labs Simulating Networks Using Cisco Modelling Labs Craig Brown (craibrow@cisco.com) Technical Marketing Engineer #clmel Physical network labs, as we know them, will become a thing of the past, and virtual

More information

What does an Operating System do?

What does an Operating System do? February 5, 2007 Perspectives on an OS There are three perspectives on an OS: 1 The user is concerned with the services it provides. Perspectives on an OS There are three perspectives on an OS: 1 The user

More information

INNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist...

INNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist... 1 INNOV-4: Fun With Virtualization Or, How I learned to love computers that don t really exist... President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and

More information

Virtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫

Virtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫 Virtual machine architecture and KVM analysis D97942011 陳彥霖 B96902030 郭宗倫 Virtual machine monitor serves as an interface between hardware and software; no matter what kind of hardware under, software can

More information

Who stole my CPU? Leonid Podolny Vineeth Remanan Pillai. Systems DigitalOcean

Who stole my CPU? Leonid Podolny Vineeth Remanan Pillai.  Systems DigitalOcean Who stole my CPU? Leonid Podolny Vineeth Remanan Pillai leonid@ vineeth@ Systems Engineering @ DigitalOcean 1 2 Introduction DigitalOcean Providing developers and businesses a reliable, easy-to-use cloud

More information

QEMU 2.0 and Beyond. CloudOpen Anthony Liguori

QEMU 2.0 and Beyond. CloudOpen Anthony Liguori QEMU 2.0 and Beyond CloudOpen 2013 Anthony Liguori About QEMU is a fast full system simulator and virtualization engine QEMU is Open Source hardware emulation KVM Xen Android SDK

More information

Hypervisors on ARM Overview and Design choices

Hypervisors on ARM Overview and Design choices Hypervisors on ARM Overview and Design choices Julien Grall Root Linux Conference 2017 ARM 2017 About me Working on ARM virtualization for the past 4 years With ARM since 2016 Co-maintaining

More information

The only open-source type-1 hypervisor

The only open-source type-1 hypervisor Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University

More information

Better Security with Virtual Machines

Better Security with Virtual Machines Better Security with Virtual Machines VMware Security Seminar Cambridge, 2006 Agenda VMware Evolution Virtual machine Server architecture Virtual infrastructure Looking forward VMware s security vision

More information

Full Scalable Media Cloud Solution with Kubernetes Orchestration. Zhenyu Wang, Xin(Owen)Zhang

Full Scalable Media Cloud Solution with Kubernetes Orchestration. Zhenyu Wang, Xin(Owen)Zhang Full Scalable Media Cloud Solution with Kubernetes Orchestration Zhenyu Wang, Xin(Owen)Zhang Agenda Media in the Network and Cloud Intel Media Server Reference Software Stack Container with MSS enablement

More information

Libvirt: a virtualization API and beyond

Libvirt: a virtualization API and beyond Libvirt: a virtualization API and beyond http://veillard.com/talks/clklinux2011.pdf Daniel Veillard veillard@redhat.com Libvirt project goals Web site: libvirt.org Virtualization library: manage guest

More information

Nano Server in Windows Server An AMA with Andrew Mason from Microsoft

Nano Server in Windows Server An AMA with Andrew Mason from Microsoft Nano Server in Windows Server 2016 An AMA with Andrew Mason from Microsoft info@altaro.com www.altaro.com Agenda info@altaro.com www.altaro.com Andy Syrewicze Twitter - @asyrewicze Blog http://www.altaro.com/hyper-v

More information

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide AppDefense Appendix Cb Defense Integration Configuration Guide Table of Contents Overview 3 Requirements 3 Provision API Key for Cb Defense Integration 3 Figure 1 Integration Type 4 Figure 2 API Key Provisioning

More information

Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide

Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Bob Crews President Checkpoint

More information

Meltdown and Spectre Mitigation. By Sathish Damodaran

Meltdown and Spectre Mitigation. By Sathish Damodaran Meltdown and Spectre Mitigation By Sathish Damodaran Introduction Meltdown allows attackers to read arbitrary physical memory (including kernel memory) for an unprivileged user process. Meltdown uses out

More information

ovirt Node June 9, 2012 Mike Burns ovirt Node 1

ovirt Node June 9, 2012 Mike Burns ovirt Node 1 ovirt Node June 9, 2012 Mike Burns ovirt Node 1 Agenda Introduction Architecture Overview Deployment Modes Installation and Configuration Upgrading Configuration Persistence Future Features Discussion

More information

Sai Janakiram Penumuru o Ten years in Oracle DBA / Oracle Apps DBA / Cloud Architect o Current Position: WW Product Expert/PMO, Cloud Platform and

Sai Janakiram Penumuru o Ten years in Oracle DBA / Oracle Apps DBA / Cloud Architect o Current Position: WW Product Expert/PMO, Cloud Platform and Sai Janakiram Penumuru o Ten years in Oracle DBA / Oracle Apps DBA / Cloud Architect o Current Position: WW Product Expert/PMO, Cloud Platform and Oracle/MS in hp o Director of Finance & Secretary - AIOUG

More information

LINUX Virtualization. Running other code under LINUX

LINUX Virtualization. Running other code under LINUX LINUX Virtualization Running other code under LINUX Environment Virtualization Citrix/MetaFrame Virtual desktop under Windows NT. aka Windows Remote Desktop Protocol VNC, Dameware virtual console. XWindows

More information

CSCI 8530 Advanced Operating Systems. Part 19 Virtualization

CSCI 8530 Advanced Operating Systems. Part 19 Virtualization CSCI 8530 Advanced Operating Systems Part 19 Virtualization Virtualization This is a very old idea It appears in many different forms A variety of commercial products exist The idea has become hot again

More information

Virtualization. Pradipta De

Virtualization. Pradipta De Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation

More information

MODERNIZING TRADITIONAL SECURITY:

MODERNIZING TRADITIONAL SECURITY: GUIDE TO MODERNIZING TRADITIONAL SECURITY: The Advantages of Moving a Legacy Application to Containers The Leading Cloud Native Cybersecurity Platform Understanding Lift and Shift As containers become

More information

监控您的 SmartCloud 刘鹤 IBM 软件部

监控您的 SmartCloud 刘鹤 IBM 软件部 监控您的 SmartCloud 刘鹤 IBM 软件部 Agenda Why is SmartCloud Monitoring Important Best Practices for SmartCloud Monitoring of VMware Operational Health Dashboard Deployment Considerations Historical Collection

More information

Background. IBM sold expensive mainframes to large organizations. Monitor sits between one or more OSes and HW

Background. IBM sold expensive mainframes to large organizations. Monitor sits between one or more OSes and HW Virtual Machines Background IBM sold expensive mainframes to large organizations Some wanted to run different OSes at the same time (because applications were developed on old OSes) Solution: IBM developed

More information

[537] Virtual Machines. Tyler Harter

[537] Virtual Machines. Tyler Harter [537] Virtual Machines Tyler Harter Outline Machine Virtualization Overview CPU Virtualization (Trap-and-Emulate) CPU Virtualization (Modern x86) Memory Virtualization Performance Challenges Outline Machine

More information

Virtualisation: The KVM Way. Amit Shah

Virtualisation: The KVM Way. Amit Shah Virtualisation: The KVM Way Amit Shah amit.shah@qumranet.com foss.in/2007 Virtualisation Simulation of computer system in software Components Processor Management: register state, instructions, exceptions

More information

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis White paper How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis AhnLab, Inc. Table of Contents Introduction... 1 Multidimensional Analysis... 1 Cloud-based Analysis...

More information

Cloud and Datacenter Networking

Cloud and Datacenter Networking Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

Testing System Virtual Machines

Testing System Virtual Machines Testing System Virtual Machines Lorenzo Martignoni 1 Roberto Paleari 2 Giampaolo Fresi Roglia 2 Danilo Bruschi 2 1 Università degli Studi di Udine 2 Università degli Studi di Milano International Conference

More information

vnetwork Future Direction Howie Xu, VMware R&D November 4, 2008

vnetwork Future Direction Howie Xu, VMware R&D November 4, 2008 vnetwork Future Direction Howie Xu, VMware R&D November 4, 2008 Virtual Datacenter OS from VMware Infrastructure vservices and Cloud vservices Existing New - roadmap Virtual Datacenter OS from VMware Agenda

More information

An Introduction to Platform Security

An Introduction to Platform Security presented by An Introduction to Platform Security Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Brent Holtsclaw and John Loucaides (Intel) Legal Notice No computer system can be

More information

Data Path acceleration techniques in a NFV world

Data Path acceleration techniques in a NFV world Data Path acceleration techniques in a NFV world Mohanraj Venkatachalam, Purnendu Ghosh Abstract NFV is a revolutionary approach offering greater flexibility and scalability in the deployment of virtual

More information

Xen Project 4.4: Features and Futures. Russell Pavlicek Xen Project Evangelist Citrix Systems

Xen Project 4.4: Features and Futures. Russell Pavlicek Xen Project Evangelist Citrix Systems Xen Project 4.4: Features and Futures Russell Pavlicek Xen Project Evangelist Citrix Systems About This Release Xen Project 4.4.0 was released on March 10, 2014. This release is the work of 8 months of

More information

KVM PV DEVICES.

KVM PV DEVICES. K DEVICES dor.laor@qumranet.com Agenda Kernel Virtual Machine overview Paravirtualized s intro & brief history VirtIO Enhanced VirtIO with K support 2 Kernel Virtual Machine overview is a regular Linux

More information

Product Security. for Consumer Devices. Anton von Troyer Codenomicon. all rights reserved.

Product Security. for Consumer Devices. Anton von Troyer Codenomicon. all rights reserved. Product Security Anton von Troyer for Consumer Devices About Codenomicon Founded in Autumn 2001 Commercialized the academic approach built since 1996 Technology leader in security test automation Model-based,

More information

LINUX KVM FRANCISCO JAVIER VARGAS GARCIA-DONAS CLOUD COMPUTING 2017

LINUX KVM FRANCISCO JAVIER VARGAS GARCIA-DONAS CLOUD COMPUTING 2017 LINUX KVM FRANCISCO JAVIER VARGAS GARCIA-DONAS CLOUD COMPUTING 2017 LINUX KERNEL-BASED VIRTUAL MACHINE KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware

More information

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,

More information

Multi-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date

Multi-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date Multi-tenancy Virtualization Challenges & Solutions Daniel J Walsh Mr SELinux, Red Hat Date 06.28.12 What is Cloud? What is IaaS? IaaS = Infrastructure-as-a-Service What is PaaS? PaaS = Platform-as-a-Service

More information

W4118: virtual machines

W4118: virtual machines W4118: virtual machines Instructor: Junfeng Yang References: Modern Operating Systems (3 rd edition), Operating Systems Concepts (8 th edition), previous W4118, and OS at MIT, Stanford, and UWisc Virtual

More information

KVM PV DEVICES.

KVM PV DEVICES. K DEVICES dor.laor@qumranet.com 1 Agenda Introduction & brief history VirtIO Enhanced VirtIO with K support Further implementation 2 General & history Fully virtualized devices performs bad 55 Mbps for

More information

An overview of virtual machine architecture

An overview of virtual machine architecture An overview of virtual machine architecture Outline History Standardized System Components Virtual Machine Basics Process VMs System VMs Virtualizing Process Summary and Taxonomy History In ancient times:

More information

OS Virtualization. Why Virtualize? Introduction. Virtualization Basics 12/10/2012. Motivation. Types of Virtualization.

OS Virtualization. Why Virtualize? Introduction. Virtualization Basics 12/10/2012. Motivation. Types of Virtualization. Virtualization Basics Motivation OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Types of Virtualization Process virtualization (Java) System virtualization (classic, hosted) Emulation

More information

Introduction to Cloud Computing and Virtualization. Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay

Introduction to Cloud Computing and Virtualization. Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay Introduction to Cloud Computing and Virtualization By Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay Talk Layout Cloud Computing Need Features Feasibility Virtualization of Machines What

More information

How CloudEndure Disaster Recovery Works

How CloudEndure Disaster Recovery Works How CloudEndure Disaster Recovery Works Technical White Paper How CloudEndure Disaster Recovery Works THE TECHNOLOGY BEHIND CLOUDENDURE S ENTERPRISE-GRADE DISASTER RECOVERY SOLUTION Introduction CloudEndure

More information

Introduction to SGX (Software Guard Extensions) and SGX Virtualization. Kai Huang, Jun Nakajima (Speaker) July 12, 2017

Introduction to SGX (Software Guard Extensions) and SGX Virtualization. Kai Huang, Jun Nakajima (Speaker) July 12, 2017 Introduction to SGX (Software Guard Extensions) and SGX Virtualization Kai Huang, Jun Nakajima (Speaker) July 12, 2017 1 INTEL RESTRICTED SECRET Agenda SGX Introduction Xen SGX Virtualization Support Backup

More information

Nested Virtualization Update From Intel. Xiantao Zhang, Eddie Dong Intel Corporation

Nested Virtualization Update From Intel. Xiantao Zhang, Eddie Dong Intel Corporation Nested Virtualization Update From Intel Xiantao Zhang, Eddie Dong Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Vulnerability Assessment using Nessus

Vulnerability Assessment using Nessus Vulnerability Assessment using Nessus What you need Computer with VirtualBox. You can use any host OS you like, and if you prefer to use some other virtual machine software like VMware or Xen, that s fine

More information

Industrial hardware and QEMU. LinuxCon Europe 2012, Barcelona Alberto Garcia

Industrial hardware and QEMU. LinuxCon Europe 2012, Barcelona Alberto Garcia Alberto Garcia Introduction About me Who am I? Alberto Garcia Computer engineer, Coruña University Working at Igalia since 2001 Experience in operating systems Debian maintainer Involved

More information