xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
* Request for assistance
@ 2010-03-12 14:04 Aditya Pendyala
  2010-03-12 14:08 ` Fwd: " Aditya Pendyala
  0 siblings, 1 reply; 2+ messages in thread
From: Aditya Pendyala @ 2010-03-12 14:04 UTC (permalink / raw)
  To: xen-devel


[-- Attachment #1.1: Type: text/plain, Size: 1113 bytes --]

Hi all,
We are students of International Institute of Technology,Bangalore,India.We
are doing project work on Xen hypervisor.We got your contact from *"Ian
Prat"*.
We have been assigned the task to prove the security of virtualization
environment provided by xen.We request your assistance in this regards and
clarify the following issues.

Does Xen follow any security model, in particular, does a Random Oracle (RO)
fit in Xen?
When there are concurrent Guest OS running on the same hardware, then there
has to be a mechanism for concurrency control and fairness, how does Xen
implement these?
Shared memory access has to make sure that one "malicious" OS doesn't access
other's memory, where and how is this done?
Similarly with shared network, how and where is security handled in this
case so that packets meant for one OS are not accessible to other OS?
Does xen has cryptography implementation in the code ?
If you have idea regarding *"provable security" *property of Xen , can you
give us a gist of it ?


Thanks&Regards,
Aditya Pendyala,
Reehan IL Ahmed Khan,
G MD Nabi Saheb,
Shwetha M,
Rishabh Namdeo

[-- Attachment #1.2: Type: text/html, Size: 1333 bytes --]

[-- Attachment #2: Type: text/plain, Size: 138 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Fwd: Request for assistance
  2010-03-12 14:04 Request for assistance Aditya Pendyala
@ 2010-03-12 14:08 ` Aditya Pendyala
  0 siblings, 0 replies; 2+ messages in thread
From: Aditya Pendyala @ 2010-03-12 14:08 UTC (permalink / raw)
  To: xen-devel; +Cc: Shweta M, Rishabh Namdeo, GMDNabi Saheb, Reehan


[-- Attachment #1.1: Type: text/plain, Size: 1342 bytes --]

Adding my project team in the loop

---------- Forwarded message ----------
From: Aditya Pendyala <aditya.pendyala@iiitb.net>
Date: Fri, Mar 12, 2010 at 7:34 PM
Subject: Request for assistance
To: xen-devel@lists.xensource.com


Hi all,
We are students of International Institute of Technology,Bangalore,India.We
are doing project work on Xen hypervisor.We got your contact from *"Ian
Prat"*.
We have been assigned the task to prove the security of virtualization
environment provided by xen.We request your assistance in this regards and
clarify the following issues.

Does Xen follow any security model, in particular, does a Random Oracle (RO)
fit in Xen?
When there are concurrent Guest OS running on the same hardware, then there
has to be a mechanism for concurrency control and fairness, how does Xen
implement these?
Shared memory access has to make sure that one "malicious" OS doesn't access
other's memory, where and how is this done?
Similarly with shared network, how and where is security handled in this
case so that packets meant for one OS are not accessible to other OS?
Does xen has cryptography implementation in the code ?
If you have idea regarding *"provable security" *property of Xen , can you
give us a gist of it ?


Thanks&Regards,
Aditya Pendyala,
Reehan IL Ahmed Khan,
G MD Nabi Saheb,
Shwetha M,
Rishabh Namdeo

[-- Attachment #1.2: Type: text/html, Size: 1808 bytes --]

[-- Attachment #2: Type: text/plain, Size: 138 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2010-03-12 14:08 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-12 14:04 Request for assistance Aditya Pendyala
2010-03-12 14:08 ` Fwd: " Aditya Pendyala

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).