|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Fwd: Request for assistance
Adding my project team in the loop
---------- Forwarded message ---------- From: Aditya Pendyala <aditya.pendyala@xxxxxxxxx>
Date: Fri, Mar 12, 2010 at 7:34 PM Subject: Request for assistance To: xen-devel@xxxxxxxxxxxxxxxxxxxHi all, We are students of International Institute of Technology,Bangalore,India.We are doing project work on Xen hypervisor.We got your contact from "Ian Prat".
We have been assigned
the task to prove the security of virtualization environment provided by xen.We request your assistance in this regards and clarify the following issues.
Does Xen follow any security model, in particular, does a Random Oracle (RO) fit in Xen?When
there are concurrent Guest OS running on the same hardware, then there
has to be a mechanism for concurrency control and fairness, how does
Xen implement these?Shared memory access has to make sure that one "malicious" OS doesn't access other's memory, where and how is this done?Similarly
with shared network, how and where is security handled in this case so
that packets meant for one OS are not accessible to other OS?Does xen has cryptography implementation in the code ?If you have idea regarding "provable security" property of Xen , can you give us a gist of it ?
Thanks&Regards, Aditya Pendyala, Reehan IL Ahmed Khan, G MD Nabi Saheb, Shwetha M, Rishabh Namdeo
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|