2017
DOI: 10.2200/s00754ed1v01y201701cac038
|View full text |Cite
|
Sign up to set email alerts
|

Hardware and Software Support for Virtualization

Abstract: Synthesis Lectures on Computer Architecture publishes 50-to 100-page publications on topics pertaining to the science and art of designing, analyzing, selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals. e scope will largely follow the purview of premier computer architecture conferences, such as ISCA, HPCA, MICRO, and ASPLOS.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 75 publications
0
21
0
2
Order By: Relevance
“…Гипервизор предоставляет гостю набор виртуальных устройств, затем он перехватывает обращения гостя к устройствам ввода-вывода и эмулирует их, используя в том числе и реальные устройства. Такой принцип виртуализации ввода-вывода характеризуется как интерпозиция [1].…”
Section: интерпозиция ввода-выводаunclassified
“…Гипервизор предоставляет гостю набор виртуальных устройств, затем он перехватывает обращения гостя к устройствам ввода-вывода и эмулирует их, используя в том числе и реальные устройства. Такой принцип виртуализации ввода-вывода характеризуется как интерпозиция [1].…”
Section: интерпозиция ввода-выводаunclassified
“…Threat due to DMA-capable hardware devices (HY-DV5): The security threat from a DMA-capable device is that, since the VM controls the device, it can program the device to perform DMA operations directed at any physical (host) memory location, including the areas belonging to other VMs or the hypervisor [6]. Thus, the direct device assignment has the potential to subvert the isolation between VMs (rather making the MMU enforced isolation function (part of HY-BF1) meaningless).…”
Section: Potential Threat To Hy-bf2mentioning
confidence: 99%
“…Hypervisor allocates the sufficient processing units and memories to each virtual machine [2]. Essentially, virtualization environments come in two forms: hosted virtualization form (Figure 2.a) and bare-metal also called native virtualization ( Figure 2.b) [11]. In Bare-metal hypervisor, there is no need to install a server operating system first, so the hypervisor has direct access to hardware resources [10].…”
Section: Figure 1b Multiple Operating Systems Share Hardware Resourcesmentioning
confidence: 99%
“…Unlike native hypervisor, the hosted hypervisor is like applications that install on a guest operating system. The hosted hypervisor manages the virtual machines, communicates and interacts with operating system of the host machine to access its resources [11]. Parallel Desktop, Microsoft Virtual PC and VMware Workstation pro are the most common hosted hypervisors.…”
Section: Figure 1b Multiple Operating Systems Share Hardware Resourcesmentioning
confidence: 99%