FoxyTechnique: Tricking Operating System Policies with a Virtual Machine Monitor

被引:0
|
作者
Yamada, Hiroshi [1 ]
Kono, Kenji [1 ]
机构
[1] Keio Univ, Dept Informat & Comp Sci, Kohoku Ku, Yokohama, Kanagawa 223, Japan
关键词
Resource Management; Virtual Machine; Interference;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed, it is quite difficult to deploy a new one widely because it is difficult, costly and often impractical endeavor to modify existing OSes to integrate a new policy. To address this problem, we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique, which virtualizes physical devices differently from real ones and tricks a guest OS into producing a behavior similar to a desired policy. FoxyTechnique offers several advantages. First, it allows us to implement a new policy without the need to make any changes to OS kernels. Second, Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally, Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique, we conducted two case studies, FoxyVegas and FoxyIdle, on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling, respectively.
引用
收藏
页码:55 / 64
页数:10
相关论文
共 50 条
  • [1] Analysis of Virtual Machine System Policies
    Rueda, Sandra
    Vijayakumar, Hayawardh
    Jaeger, Trent
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 227 - 236
  • [2] Automated dynamic redistribution of virtual operating systems under the xen virtual machine monitor
    Vachon, Travis F.
    Teresco, James D.
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 190 - +
  • [3] Implementation of Virtual Time System for the Distributed Virtual Machine Monitor
    Chen, Siming
    Zhu, Mingfa
    Xiao, Limin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 571 - 576
  • [4] Linux/RTOS hybrid operating environment on Gandalf virtual machine monitor
    Oikawa, Shuichi
    Ito, Megumi
    Nakajima, Tatsuo
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, 4096 : 287 - 296
  • [5] A MLS cooperation system based on virtual machine monitor
    Dong GuiShan
    Li Xin
    Lu XianLiang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6345 - +
  • [7] Requirements for operating systems included in virtual machine system
    Kovacevic, V.
    Popovic, M.
    Secerov, E.
    [J]. Systems Science, 1991, 17 (01):
  • [8] Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System
    Luo, Qiuming
    Xiao, Feng
    Ming, Zhong
    Li, Hao
    Chen, Jianyong
    Zhang, Jianhua
    [J]. COMPUTER, 2016, 49 (06) : 66 - 74
  • [9] Deploying Virtual Honeypots on Virtual Machine Monitor
    Zakaria, Wira Zanoramy Ansiry
    Ahmad, Siti Rohaidah
    Azz, Norazah Abd
    [J]. INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2686 - 2690
  • [10] Workload Classification Model for Specializing Virtual Machine Operating System
    Zhao, Xinkui
    Yin, Jianwei
    Chen, Zuoning
    He, Sheng
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 343 - 350