Method for reducing trusted computing base of host virtual software

A technology of virtualization software and trusted computing, which is applied in the field of virtualized software trusted computing base, and can solve the problems of not considering the complexity of guestOSTCB reduction problem, affecting virtualization performance overhead, etc.

Active Publication Date: 2016-07-06
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. Due to the need to introduce an additional thin privileged software layer or modify the hardware architecture, the performance overhead of virtualization is affected to a certain extent;
[0009] 2. The targets of these solutions are bare-model virtualization soft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reducing trusted computing base of host virtual software
  • Method for reducing trusted computing base of host virtual software
  • Method for reducing trusted computing base of host virtual software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0024] The invention proposes a method for reducing the trusted computing base of host-type virtualization software. Invention consists of two aspects:

[0025] (1) Aiming at the huge privileged code of hostOS, a method of reducing hostOS is proposed;

[0026] (2) For the hypervisor residing in the hostOS, a method of maintaining its dependence on the OS and reducing its privileged code is pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for reducing trusted computing base of host type virtual software, wherein specific to privilege code of a host operation system (host OS), the functions of the host OS are provided for upper layer applications to use in a user space through adoption of a ''base'' form, wherein the upper layer applications comprise virtual software and other application programs; specific to privilege code of the virtual software, the privilege code of the virtual software is degraded and separated; privilege code ''minor OS'' operated in a kernel space is set and is used for finishing necessary communication with hardware resources; OS ''libOS'' of a non-privilege level user space is set and is used for finishing user layer realization of the OS function; virtual software ''hypervisor'' operated in the user space is set; and a privilege part ''minor hypervisor'' which is operated in the kernel space and is used for processing a virtual software request is set.

Description

technical field [0001] The invention belongs to the technical field of virtualized software trusted computing base, and more specifically relates to a method for reducing the host-type virtualized software trusted computing base. Background technique [0002] Virtualization software provides a solution for making full use of underlying physical hardware resources, and the guest operating system (guestOS) running on it uses virtual hardware resources. Virtualization software needs to provide virtualization solutions for CPU, memory, IO peripherals, etc., so it usually has a huge code base. For example, the open source project Xen has more than 500,000 lines of source code; the KVM project, in addition to the KVM kernel module itself, its underlying Linux system is also included in the Trusted Computing Base (TCB), with millions of lines of privileged code. [0003] There are two types of virtualization software: bare-metal hypervisor and hosted hypervisor. Bare-metalhypervi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45587
Inventor 羌卫中金海章康邹德清
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products