FoxyTechnique: Tricking operating system policies with a virtual machine monitor

Hiroshi Yamada, Kenji Kono

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed, it is quite difficult to deploy a new one widely because it is difficult, costly and often impractical endeavor to modify existing OSes to integrate a new policy. To address this problem, we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique, which virtualizes physical devices differently from real ones and tricks a guest OS into producing a behavior similar to a desired policy. FoxyTechnique offers several advantages. First, it allows us to implement a new policy without the need to make any changes to OS kernels. Second, Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally, Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique, we conducted two case studies, FoxyVegas and FoxyIdle, on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling, respectively.

Original languageEnglish
Title of host publicationVEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments
Pages55-64
Number of pages10
DOIs
Publication statusPublished - 2007
EventVEE'07: 3rd International Conference on Virtual Execution Environments - San Diego, CA, United States
Duration: 2007 Jun 132007 Jun 15

Other

OtherVEE'07: 3rd International Conference on Virtual Execution Environments
CountryUnited States
CitySan Diego, CA
Period07/6/1307/6/15

Fingerprint

Computer monitors
Computer operating systems
Scheduling
Hardware
Virtual machine
Linux

Keywords

  • Interference
  • Resource management
  • Virtual machine

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Yamada, H., & Kono, K. (2007). FoxyTechnique: Tricking operating system policies with a virtual machine monitor. In VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments (pp. 55-64) https://doi.org/10.1145/1254810.1254818

FoxyTechnique : Tricking operating system policies with a virtual machine monitor. / Yamada, Hiroshi; Kono, Kenji.

VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. 2007. p. 55-64.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yamada, H & Kono, K 2007, FoxyTechnique: Tricking operating system policies with a virtual machine monitor. in VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. pp. 55-64, VEE'07: 3rd International Conference on Virtual Execution Environments, San Diego, CA, United States, 07/6/13. https://doi.org/10.1145/1254810.1254818
Yamada H, Kono K. FoxyTechnique: Tricking operating system policies with a virtual machine monitor. In VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. 2007. p. 55-64 https://doi.org/10.1145/1254810.1254818
Yamada, Hiroshi ; Kono, Kenji. / FoxyTechnique : Tricking operating system policies with a virtual machine monitor. VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. 2007. pp. 55-64
@inproceedings{2a031cb3ee5048a48d04e3720b4e9dc3,
title = "FoxyTechnique: Tricking operating system policies with a virtual machine monitor",
abstract = "Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed, it is quite difficult to deploy a new one widely because it is difficult, costly and often impractical endeavor to modify existing OSes to integrate a new policy. To address this problem, we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique, which virtualizes physical devices differently from real ones and tricks a guest OS into producing a behavior similar to a desired policy. FoxyTechnique offers several advantages. First, it allows us to implement a new policy without the need to make any changes to OS kernels. Second, Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally, Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique, we conducted two case studies, FoxyVegas and FoxyIdle, on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling, respectively.",
keywords = "Interference, Resource management, Virtual machine",
author = "Hiroshi Yamada and Kenji Kono",
year = "2007",
doi = "10.1145/1254810.1254818",
language = "English",
isbn = "1595936300",
pages = "55--64",
booktitle = "VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments",

}

TY - GEN

T1 - FoxyTechnique

T2 - Tricking operating system policies with a virtual machine monitor

AU - Yamada, Hiroshi

AU - Kono, Kenji

PY - 2007

Y1 - 2007

N2 - Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed, it is quite difficult to deploy a new one widely because it is difficult, costly and often impractical endeavor to modify existing OSes to integrate a new policy. To address this problem, we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique, which virtualizes physical devices differently from real ones and tricks a guest OS into producing a behavior similar to a desired policy. FoxyTechnique offers several advantages. First, it allows us to implement a new policy without the need to make any changes to OS kernels. Second, Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally, Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique, we conducted two case studies, FoxyVegas and FoxyIdle, on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling, respectively.

AB - Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed, it is quite difficult to deploy a new one widely because it is difficult, costly and often impractical endeavor to modify existing OSes to integrate a new policy. To address this problem, we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique, which virtualizes physical devices differently from real ones and tricks a guest OS into producing a behavior similar to a desired policy. FoxyTechnique offers several advantages. First, it allows us to implement a new policy without the need to make any changes to OS kernels. Second, Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally, Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique, we conducted two case studies, FoxyVegas and FoxyIdle, on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling, respectively.

KW - Interference

KW - Resource management

KW - Virtual machine

UR - http://www.scopus.com/inward/record.url?scp=35448953425&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35448953425&partnerID=8YFLogxK

U2 - 10.1145/1254810.1254818

DO - 10.1145/1254810.1254818

M3 - Conference contribution

AN - SCOPUS:35448953425

SN - 1595936300

SN - 9781595936301

SP - 55

EP - 64

BT - VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments

ER -