L4 - Virtualization and Beyond

  • 발행 : 2008.10.20

초록

키워드

참고문헌

  1. M. J. Accetta, R. V. Baron, W. Bolosky, D. B. Golub, R. F. Rashid, A. Tevanian, and M. W. Young. Mach: A new kernel foundation for unix development. In USENIX Summer Conference, pp. 93-113, Atlanta, GA, June 1986.
  2. K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In ASPLOS-XII: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, pp. 2-13, New York, NY, USA, 2006. ACM.
  3. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating System Principles(SOSP), pp. 164-177, Bolton Landing, NY, Oct. 2003.
  4. A. Bottcher, B. Kauer, and H. Hartig. Trusted computing serving an anonymity service. Springer Lecture Notes in Computer Science, 4968:143-154, 2008.
  5. J. Brakensiek, A. Droge, H. Hartig, A. Lackorzynski, and M. Botteck. Virtualization as an enabler for security in mobile devices. In Proceedings of the First Workshop on Isolation and Integration in Embedded Systems(IIES 2008), EuroSys 2008 Affiliated Workshop, pp. 17-22, Glasgow, Scotland, UK, April 2008.
  6. P. Brinch Hansen. The nucleus of a multiprogramming system. Commun. ACM, 13(4):238-241, Apr. 1970. https://doi.org/10.1145/362258.362278
  7. M. Bushnell. Towards a New Strategy of OS Design. January 1994.
  8. A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systemserrors. In SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, pp. 73-88, New York, NY, USA, 2001. ACM.
  9. N. Feske and H. Härtig. Demonstration of DOpE - a Window Server for Real-Time and Embedded Systems. In 24th IEEE Real-Time Systems Symposium( RTSS), pp. 74-77, Cancun, Mexico, Dec. 2003.
  10. H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The nizza secure-system architecture. In IEEE Collaborate-Com 2005. IEEE Press, 2005.
  11. H. Hartig, M. Hohmuth, J. Liedtke, S. Schonberg, and J. Wolter. The performance of $\mu$-kernel-based systems. In Proceedings of the 16th ACM Symposium on Operating System Principles(SOSP), pp. 66-77, Saint-Malo, France, Oct. 1997.
  12. C. Helmuth, A. Warg, and N. Feske. Mikro-SINA -Hands-on Experiences with the Nizza Security Architecture. In Proceedings of the D.A.CH Security 2005, Darmstadt, Germany, Mar. 2005
  13. G. C. Hunt and J. R. Larus. Singularity: rethinking the software stack. SIGOPS Oper. Syst. Rev., 41(2): 37-49, 2007
  14. M. F. Kaashoek, D. R. Engler, G. R. Ganger, H. Briceno, R. Hunt, D. Mazieres, T. Pinckney, R. Grimm, and T. Pinckney. Application performance and flexibility on exokernel systems. In Proceedings of the 16th ACM Symposium on Operating System Principles(SOSP), Saint-Malo, France, Oct. 1997.
  15. A. Lackorzynksi. TUD:OS - the L4 SMP microkernel on ARM11 MPCore. http://www.youtube.com/watch?v=dWVfaZYkz-Y.
  16. C. Lattner and V. Adve. LLVM: a compilation framework for lifelong program analysis & transformation. Code Generation and Optimization, 2004. CGO 2004. International Symposium on, pp. 75-86, March 2004.
  17. J. LeVasseur, V. Uhlig, J. Stoess, and S. Gotz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, Berkeley, CA, USA, 2004. USENIX Association.
  18. J. Liedtke. Improving IPC by kernel design. In Proceedings of the 14th ACM Symposium on Operating System Principles(SOSP), pp. 175-188, Asheville, NC, Dec. 1993.
  19. J. Liedtke. On $\mu$-kernel construction. In Proceedings of the 15th ACM Symposium on Operating System Principles(SOSP), pp. 237-250, Copper Mountain Resort, CO, Dec. 1995
  20. J. Loser and H. Hartig. Real Time on Ethernet using off-the-shelf Hardware. In 1st Intl Workshop on Real-Time LANs in the Internet Age, Vienna, Austria, June 2002.
  21. Norman Feske and Christian Helmuth. A Nitpicker's guide to a minimal complexity secure GUI. In Proceedings of the 21st Annual Computer Security Applications Conference(ACSAC), 2005
  22. G. J. Popek and R. P. Goldberg. Formal requirements for virtualizable third generation architectures. Commun. ACM, 17(7):412-421, 1974 https://doi.org/10.1145/361011.361073
  23. L. Reuther and M. Pohlack. Rotational-Position-Aware Real-Time Disk Scheduling Using a Dynamic Active Subset(DAS). In 24th IEEE Real-Time Systems Symposium(RTSS), pp. 374-385, Cancun, Mexico, Dec. 2003.
  24. L. Singaravelu, B. Kauer, A. Boettcher, H. Haertig, C. Pu, G. Jung, and C. Weinhold. Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow. Technical report, GeorgiaTec University, Nov. 2007
  25. L. Singaravelu, C. Pu, H. Hartig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev., 40(4):, 2006
  26. J. Sugerman, G. Venkitachalam, and B.-H. Lim. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor. In Proceedings of the 2001 USENIX Annual Technical Conference, General Track, pp. 1-14, Boston, Massachusetts, USA, June 2001
  27. C. Weinhold and H. Hartig. VPFS: building a virtual private file system with a small trusted computing base. SIGOPS Oper. Syst. Rev., 42(4):81-93, 2008