期刊文献+

基于Petri网的虚拟化I/O控制

On Virtulization of I / O Control based on Petri Net
下载PDF
导出
摘要 在虚拟化技术中,黑客可利用虚拟化监视器(Virtual Machine Monitor)中存在的隐藏信息流窃取用户信息,并且恶意调用(Input/Output,I/O)资源攻击虚拟化监视器.本文以Petri网为系统逻辑设计工具,建立了一种基于Petri网的虚拟化I/O控制模型.该模型解决多个虚拟机争夺共享I/O资源以及虚拟机监视器在管理虚拟机I/O资源的权限时出现的同步问题.本文进一步通过分析Petri网的可达标识图和S_不变量对模型I/O资源间的同步和互斥进行了验证. In the virtualization technology,hackers can steal the userinfo hidden in the monitor of a virtual machine,which also maliciously call the resources of I / O to attack Virtual Machine Monitors( VMM). Petri nets are suitable to design the system logic of a target system. Hence,this paper proposes a novel virtualization I / O control model by using Petri nets. The competition of limited I / O resources among multiple virtual machines is decided and the synchronization problem appearing in I / O resource permission management for a VMM is solved.This paper further verifies the synchronization and the mutual exclusion of I / O resources by using the reach ability graph,S_ invariant,and flow diagram of Petri nets.
出处 《绵阳师范学院学报》 2016年第2期73-78,共6页 Journal of Mianyang Teachers' College
基金 四川省科技厅项目(2013JY0089 2016JY0244) 四川省教育厅重点项目(13ZA0019)
关键词 PETRI网 虚拟化技术 虚拟化I/O S_不变 Petri Nets Virtualization Technology Virtualization I / O S_invariant
  • 相关文献

参考文献10

二级参考文献130

  • 1ROSENBLUM M, GARFINKEL T. Virtual machine monitors :current technology and future trends [ J]. IEEE Computer, 2005,38 (5) : 39-47.
  • 2SMITH J E, NAIR R. Virtual machines: versatile platforms for systems and processes[ M]. Beijing: Publishing House of Electronics Industry, 2006:382-390.
  • 3GOLDBERG R P. Survey of virtual machine research [ J ]. Computer, 1974,7(6) :34-45.
  • 4POPEK G J, GOLDBERG R P. Formal requirements for virtualizable third-generation architectures [ J ]. Communications of the ACM, 1974,17(7 ) :412-421.
  • 5ROBIN J S, IRVINE C E. Analysis of the Intel Pentium' s ability to support a secure virtual machine monitor[ C ]//Proc of the 9th USE- NIX Security Symposium. 2000.
  • 6MENASCE D A. Virtualization: concepts, applications, and performance modeling [ C ]//Proc of the 31st Int Computer Measurement Group Conf. 2005.
  • 7WHITAKER A, COX R S, SHAW M, et al. Rethinking the design of virtual machine monitors[J] EEE Computer, 2005,38(5) :57-62.
  • 8KARGER P A, ZURKO M E, BONIN D W, et al. A restrospective on the VAX VMM security kernel[ J]. IEEE Trans on Software Engineering, 1991,17 ( 11 ) : 1147-1165.
  • 9SUGERMAN J, VENKITACHALAM G, LIMB H. Virtualizing I/O devices on VMwarc workstation' s hosted virtual machine monitor [ C]//Proc of USENIX Annual Technical Conference. 2001:1-14.
  • 10BARHAM P,DRAGOVIC B,FRASER K,et al. Xen and the art of virtualization[ Cl//Proc of the 19th ACM Symp on Operating System Principles. 2003 : 164-177.

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部