Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles 2013
DOI: 10.1145/2517349.2522719
|View full text |Cite
|
Sign up to set email alerts
|

VirtuOS

Abstract: Most operating systems provide protection and isolation to user processes, but not to critical system components such as device drivers or other system code. Consequently, failures in these components often lead to system failures. VirtuOS is an operating system that exploits a new method of decomposition to protect against such failures. VirtuOS exploits virtualization to isolate and protect vertical slices of existing OS kernels in separate service domains. Each service domain represents a partition of an ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(6 citation statements)
references
References 36 publications
0
5
0
1
Order By: Relevance
“…VM-based Backend. Many works use virtualization to support isolation within a kernel [33,40,41,56]. VM-based isolation provides strong security guarantees and is widely supported, at the cost of higher overhead.…”
Section: Implementation Prototypementioning
confidence: 99%
“…VM-based Backend. Many works use virtualization to support isolation within a kernel [33,40,41,56]. VM-based isolation provides strong security guarantees and is widely supported, at the cost of higher overhead.…”
Section: Implementation Prototypementioning
confidence: 99%
“…Device Virtualization and Passthrough. During the past decade, advances in device virtualization have decreased the trusted code base for isolated I/O channels, gradually evolving from the monolithic hypervisors/VMMs to hypervisors with privileged device management domains [11], then to hypervisors with disengaged privileged domains [18], and finally to hypervisors with isolated driver domains [22,51]. However, applications in their guest domains still communicate with virtualized devices via the untrusted guest OS on which they run, which still implies that a huge code base has to be trusted for on-demand, isolated I/O.…”
Section: A I/o Isolation Systemsmentioning
confidence: 99%
“…Several approaches [12,23,42,43,51,63,68] exist to isolate device drivers from the OS kernel, and/or move them to user-space, primarily for the purpose of improving driver reliability and fault isolation. Swift et al propose using hardware memory protection domains to isolate the drivers of a monolithic kernel [63].…”
Section: Device Driver Isolation and Decompositionmentioning
confidence: 99%
“…Un DVS ofrece entornos de ejecución virtuales distribuidos en los cuales se permite ejecutar múltiples instancias aisladas de Sistemas Operativos Virtuales (VOS) [2]. Un VOS ofrece abstracciones y servicios a las aplicaciones de usuario, pero no gestiona hardware físico, sino dispositivos virtuales proporcionados por un Sistema Operativo (OS) real.…”
Section: Introductionunclassified