FoxyTechnique: Tricking operating system policies with a virtual machine monitor

Hiroshi Yamada, Kenji Kono

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed, it is quite difficult to deploy a new one widely because it is difficult, costly and often impractical endeavor to modify existing OSes to integrate a new policy. To address this problem, we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique, which virtualizes physical devices differently from real ones and tricks a guest OS into producing a behavior similar to a desired policy. FoxyTechnique offers several advantages. First, it allows us to implement a new policy without the need to make any changes to OS kernels. Second, Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally, Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique, we conducted two case studies, FoxyVegas and FoxyIdle, on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling, respectively.

Original languageEnglish
Title of host publicationVEE'07
Subtitle of host publicationProceedings of the 3rd International Conference on Virtual Execution Environments
Pages55-64
Number of pages10
DOIs
Publication statusPublished - 2007 Oct 29
EventVEE'07: 3rd International Conference on Virtual Execution Environments - San Diego, CA, United States
Duration: 2007 Jun 132007 Jun 15

Publication series

NameVEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments

Other

OtherVEE'07: 3rd International Conference on Virtual Execution Environments
CountryUnited States
CitySan Diego, CA
Period07/6/1307/6/15

Keywords

  • Interference
  • Resource management
  • Virtual machine

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'FoxyTechnique: Tricking operating system policies with a virtual machine monitor'. Together they form a unique fingerprint.

  • Cite this

    Yamada, H., & Kono, K. (2007). FoxyTechnique: Tricking operating system policies with a virtual machine monitor. In VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments (pp. 55-64). (VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments). https://doi.org/10.1145/1254810.1254818