Toward Virtual Machine Image Management for Persistent Memory

2021 ◽  
Vol 17 (3) ◽  
pp. 1-24
Author(s):  
Jiachen Zhang ◽  
Lixiao Cui ◽  
Peng Li ◽  
Xiaoguang Liu ◽  
Gang Wang

Persistent memory’s (PM) byte-addressability and high capacity will also make it emerging for virtualized environment. Modern virtual machine monitors virtualize PM using either I/O virtualization or memory virtualization. However, I/O virtualization will sacrifice PM’s byte-addressability, and memory virtualization does not get the chance of PM image management. In this article, we enhance QEMU’s memory virtualization mechanism. The enhanced system can achieve both PM’s byte-addressability inside virtual machines and PM image management outside the virtual machines. We also design pcow , a virtual machine image format for PM, which is compatible with our enhanced memory virtualization and supports storage virtualization features including thin-provisioning, base image, snapshot, and striping. Address translation is performed with the help of the Extended Page Table, thus much faster than image formats implemented in I/O virtualization. We also optimize pcow considering PM’s characteristics. We perform exhaustive performance evaluations on an x86 server equipping with Intel’s Optane DC persistent memory. The evaluation demonstrates that our scheme boosts the overall performance by up to 50× compared with qcow2, an image format implemented in I/O virtualization, and brings almost no performance overhead compared with the native memory virtualization. The striping feature can also scale-out the virtual PM’s bandwidth performance.

Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 47-58
Author(s):  
S. Shterenberg ◽  
A. Moskalchuk ◽  
A. Krasov

The article demonstrates the concept of building a laboratory for penetration testing using a special pro-gram. The program is a set of scripts that configure the system in accordance with a user-defined script. Thanks to the elements of script randomization, this solution allows you to deploy several educational tasks at once to a group of students using only one virtual machine image. The basic idea is that the set-up and creation of a vulnerable target occurs just before the execution of the learning task itself. Those, the virtual machine is initially a basic Ubuntu Linux image that does not have any set of vulnerabilities. The main feature of the proposed solution is that the content of the scripts describes not one variant of the system configuration, but several at once, forming scripts with elements of randomization. In other words, having a basic Ubuntu Linux image and a set of the scripts, you can create different tasks for a dozen students.


2020 ◽  
Vol 146 ◽  
pp. 107-121
Author(s):  
Nishant Saurabh ◽  
Shajulin Benedict ◽  
Jorge G. Barbosa ◽  
Radu Prodan

2019 ◽  
Vol 7 (4) ◽  
pp. 1124-1138 ◽  
Author(s):  
Haikun Liu ◽  
Bingsheng He ◽  
Xiaofei Liao ◽  
Hai Jin

Author(s):  
Nishant Saurabh ◽  
Julian Remmers ◽  
Dragi Kimovski ◽  
Radu Prodan ◽  
Jorge G. Barbosa

2017 ◽  
Vol 30 (20) ◽  
pp. e4220 ◽  
Author(s):  
Dragi Kimovski ◽  
Attila Marosi ◽  
Sandi Gec ◽  
Nishant Saurabh ◽  
Attila Kertesz ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document