期刊文献+

基于Xen的自下而上调用的设计与实现 被引量:1

The Design and Implement of Xen-Based Upcall
下载PDF
导出
摘要 针对虚拟机监视器(virtual machine monitor,VMM)与上层客户虚拟机(Guest-VM)之间的语义鸿沟(semantic gap)问题,该文提出了一种自下而上的调用方式,该方法使得VMM能够同步调用客户机的已有功能来获取客户机语义信息,为在客户虚拟机地址空间之外的监控机制带来便利。在Xen半虚拟化环境下,实现了自下而上的同步调用方式,有效地解决了语义重构所需的重复定义和实现问题。实验表明,该方法能使VMM有效地调用客户机的已有功能为自己服务,使VMM能准确地获取上层虚拟机操作系统的信息。 In order to solve the semantic gap problem between virtual machine monitor (VMM) and guest virtual machine (VM), an up-call mechanism is proposed, with which the service request is launched by VMM, and the guest-VM is responsible to provide response to the request from VMM. This makes it possible for VMM to synchronously call guest-VM services to get guest semantic information, bringing convenience for monitor agents constructed out of guest-VM address space to get guest information exactly. The up-call mechanism implemented as a synchronous communication channel is able to make up the problem of duplicate definitions and implementations inside VMM brought by semantic reconstruction. A prototype system on the para-virtualization platform of Xen is implemented. The result shows that the method proposed in this paper is able to help VMM to call guest functions to get guest services and semantic information instantly.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2014年第6期881-886,共6页 Journal of University of Electronic Science and Technology of China
基金 国家科技支撑计划(2012BAH18B05)
关键词 内核通信 语意鸿沟 虚拟机 虚拟机监视器 XEN kernel communication semantic gap virtual machine virtual machine monitor Xen
  • 相关文献

参考文献12

  • 1RUSHBY J. A trusted computing base for embeddedsystems[C]//Proceedings 7th DoD/NBS Computer SecurityConference. [S.l.]. [s.n.],1984.
  • 2AZAB A M, NING P, SEZER E C, et al. HIMA: ahypervisor-based integrity measurement agent[C]//Computer Security Applications Conference. Hawaii, USA:IEEE, 2009.
  • 3ABHINAV SRIVASTAVA, JONATHON GIFFIN. Efficientmonitoring of untrusted kemel-mode execution[C]//Proceedings of Network & Distributed System SecuritySymposium. California, USA: [s.n.], 2011.
  • 4SHARIF M I,LEE W, CUI W, et al. Secure in-vmmonitoring using hardware virtualization[C]//Proceedings ofthe 16th ACM Conference on Computer and CommunicationsSecurity. Chicago, USA: ACM, 2009.
  • 5CHEN P M, NOBLE B D. When virtual is better thanreal[C]//Proceedings of the Eighth Workshop on Hot Topicsin Operating Systems. Elmau, Germany: IEEE, 2001.
  • 6DOLAN-GAVITT B, LEEK T,ZHIVICH M, et al. Virtuoso:Narrowing the semantic gap in virtual machine introspection[C]//2011 IEEE Symposium on Security and Privacy (SP).[S.l.]. IEEE, 2011.
  • 7JIANG X,WANG X,XU D. Stealthy malware detectionthrough vmm-based out-of-the-box semantic viewreconstruction[C]//Proceedings of the 14th ACMConference on Computer and Communications Security.Alexandria: ACM, 2007.
  • 8IBRAHIM A S,HAMLYN-HARRIS J, GRUNDY J, et al.Supporting virtualization-aware security solutions using asystematic approach to overcome the semantic gap[C]//2012 IEEE 5th International Conference on CloudComputing (CLOUD). Chicago, USA: IEEE, 2012.
  • 9LANGE J R, DINDA P. Symcall: Symbiotic virtualizationthrough vmm-to-guest upcalls[C]//ACM SIGPLAN Notices.[S.1.].ACM, 2011.
  • 10Intel Technical Articles. Intel virtualization technology:Hardware support for efficient processor virtualization[EB/OL]. [2013-05-16]. http://noggin.intel.com/content/intel-virtualization-technology-hardware-support-for-efficient-processor-virtualization.

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部