Learn More
Memory deduplication shares same-content memory pages and reduces the consumption of physical memory. It is effective on environments that run many virtual machines with the same operating system. Memory deduplication, however, is vulnerable to memory disclosure attacks, which reveal the existence of an application or file on another virtual machine. Such(More)
1. Introduction Memory deduplication merges same-content memory pages and reduces the consumption of physical memory. It is effective on environments that run many virtual machines with the same operating system. However, memory deduplication is subject to software side channel attacks, which discloses memory contents. It can be used to reveal the existence(More)
Postprint This is the accepted version of a paper presented at 5th USENIX Workshop on Hot Topics in Security (HotSec 2010). Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine. Abstract Current OSes include many logical sharing techniques (shared library, symbolic link, etc.) on memory and storage. Unfortunately(More)
OS Circular is a framework for Internet Disk Image Distribution of software for virtual machines , those which offer a ''virtualized'' common PC environment on any PC. OS images are obtained via the stackable virtual disk ''Trusted HTTP-FUSE CLOOP''. The system is designed to utilize Mirror servers and Proxies for highly-scalable worldwide deployment. OS(More)
SUMMARY Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory dedupli-cation is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an(More)
Memory deduplication merges same-content memory pages and reduces the consumption of physical memory. It is a desirable feature for virtual machines on IaaS (Infrastructure as a Service) type cloud computing, because IaaS hosts many guest OSes which are expected to include many identical memory pages. However, some security capabilities of the guest OS(More)
1 Statement of the problem In the 1960s, using computers was synonymous with writing programs. The first generation of micro computers started to appear in the 1970s, computer users shared their source code and programs. During the 1980s, desktop personal computers were becoming common, and software packages became commercial products. During the 1990s, the(More)
OS Circular is a framework of Internet Disk Image Distributor for virtual machines. The disk images are based on QEMU­DM(device model) and boot on QEMU, KQEMU, KVM and Xen­HVM. They are distributed by the stackable virtual disk "HTTP­FUSE CLOOP". It re­constructs a virtual disk with split and compressed block files on HTTP Servers. The file name of block(More)
  • 1