为了提高机载嵌入式系统软件开发效率,快速生成软件原型,同时提升机载嵌入式系统软件的可移植性,研究了基于Wind River Hypervisor的机载嵌入式系统虚拟化技术,对Wind River Hypervisor架构进行了剖析,阐述了hyperkernel的内部结构,指明...为了提高机载嵌入式系统软件开发效率,快速生成软件原型,同时提升机载嵌入式系统软件的可移植性,研究了基于Wind River Hypervisor的机载嵌入式系统虚拟化技术,对Wind River Hypervisor架构进行了剖析,阐述了hyperkernel的内部结构,指明了Wind River Hypervisor中不同类型线程在系统运行过程中所承担的角色以及运行特点,并基于Wind River Hypervisor实现了多种虚拟化架构,通过对不同架构的对比展示了每种架构的特征,同时借助workbench+vxworks653环境证实了在机载嵌入式系统部署Wind River Hypervisor架构的可行性。展开更多
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are...Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture.展开更多
通过对基于虚拟机的虚拟计算环境典型系统的分析,给出了CROWN虚拟计算平台CIVIC(CROWN-based infrastructure for virtual computing)的设计.CIVIC集成多种虚拟机技术,可以为用户提供独立、隔离的计算环境,可以为管理人员提供硬件资源...通过对基于虚拟机的虚拟计算环境典型系统的分析,给出了CROWN虚拟计算平台CIVIC(CROWN-based infrastructure for virtual computing)的设计.CIVIC集成多种虚拟机技术,可以为用户提供独立、隔离的计算环境,可以为管理人员提供硬件资源和软件资源的集中管理功能,支持对应用程序的透明性,屏蔽底层硬件资源的动态性、分布性和异构性.实验结果表明,CIVIC能够方便、高效地为用户定制所需计算环境.展开更多
文摘为了提高机载嵌入式系统软件开发效率,快速生成软件原型,同时提升机载嵌入式系统软件的可移植性,研究了基于Wind River Hypervisor的机载嵌入式系统虚拟化技术,对Wind River Hypervisor架构进行了剖析,阐述了hyperkernel的内部结构,指明了Wind River Hypervisor中不同类型线程在系统运行过程中所承担的角色以及运行特点,并基于Wind River Hypervisor实现了多种虚拟化架构,通过对不同架构的对比展示了每种架构的特征,同时借助workbench+vxworks653环境证实了在机载嵌入式系统部署Wind River Hypervisor架构的可行性。
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
文摘Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture.
基金the National Natural Science Foundation of China under Grant No.90412011 (国家自然科学基金)the National High-Tech Research and Development Plan of China under Grant No.2005AA119010 (国家高技术研究发展计划(863))+1 种基金the National Basic Research Program of China under Grant No.2005CB321803 (国家重点基础研究发展计划(973))the Outstanding Young Research Fund of China under Grant No.60525209 (国家杰出青年基金)
文摘通过对基于虚拟机的虚拟计算环境典型系统的分析,给出了CROWN虚拟计算平台CIVIC(CROWN-based infrastructure for virtual computing)的设计.CIVIC集成多种虚拟机技术,可以为用户提供独立、隔离的计算环境,可以为管理人员提供硬件资源和软件资源的集中管理功能,支持对应用程序的透明性,屏蔽底层硬件资源的动态性、分布性和异构性.实验结果表明,CIVIC能够方便、高效地为用户定制所需计算环境.