WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Request for assistance

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Request for assistance
From: Aditya Pendyala <aditya.pendyala@xxxxxxxxx>
Date: Fri, 12 Mar 2010 19:34:53 +0530
Delivery-date: Mon, 29 Mar 2010 08:32:00 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi all,
We are students of International Institute of Technology,Bangalore,India.We are doing project work on Xen hypervisor.We got your contact from "Ian Prat".
We have been assigned the task to prove the security of virtualization environment provided by xen.We request your assistance in this regards and clarify the following issues.

  • Does Xen follow any security model, in particular, does a Random Oracle (RO) fit in Xen?
  • When there are concurrent Guest OS running on the same hardware, then there has to be a mechanism for concurrency control and fairness, how does Xen implement these?
  • Shared memory access has to make sure that one "malicious" OS doesn't access other's memory, where and how is this done?
  • Similarly with shared network, how and where is security handled in this case so that packets meant for one OS are not accessible to other OS?
  • Does xen has cryptography implementation in the code ?
  • If you have idea regarding "provable security" property of Xen , can you give us a gist of it ?


  • Thanks&Regards,
    Aditya Pendyala,
    Reehan IL Ahmed Khan,
    G MD Nabi Saheb,
    Shwetha M,
    Rishabh Namdeo
    _______________________________________________
    Xen-devel mailing list
    Xen-devel@xxxxxxxxxxxxxxxxxxx
    http://lists.xensource.com/xen-devel
    
    <Prev in Thread] Current Thread [Next in Thread>