Virtual Machines
Appendix D
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-1
Virtual Machines Appendix D Computer Security: Art and Science, 2 nd - - PowerPoint PPT Presentation
Virtual Machines Appendix D Computer Security: Art and Science, 2 nd Edition Version 1.0 Slide D-1 Outline Virtual Machine Structure Virtual Machine Monitor Privilege Physical Resources Paging Computer Security: Art and
Appendix D
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-2
resources
secondary storage to each program
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-3
Physical Hardware Type-1 Hypervisor VH1 VH2 VH3 VH4 Ubuntu Linux FreeBSD z/OS Windows 10 user procs user procs user procs T2HA VHA Debian Linux Physical Hardware Operating System T2H1 T2H2 T2H3 Ubuntu Linux FreeBSD z/OS Windows 10 user procs user procs user procs T2HB VHB Windows XP VH5 VH6 VH7 VH8 VHi is virtual machine i T2Hi is type-2 hypervisor i
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-4
so o tries to read, causing trap
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-5
successfully
returns control to p
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-6
p VM running o VMM
issue read system call read invoked by hardware trap read finished return from read system call context switch to o fix o so it looks like VM serviced trap return from trap context switch to p context switch to p causes trap
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-7
fix VM PC to emulate return from trap
privilege
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-8
levels of privilege
processes at lower levels of privilege
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-9
trap; meets rule 2
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-10
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-11
emulates instruction
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-12
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-13
etc.
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-14
address
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-15
request
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-16
but VM runs at next-to-highest level
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-17
privilege level to appropriate level
processes can read those pages
mode; no security issue
loss of reliability
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-18
MVS directly
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide D-19