From mboxrd@z Thu Jan 1 00:00:00 1970 From: Aditya Pendyala Subject: Hi all Date: Mon, 15 Mar 2010 15:41:06 +0530 Message-ID: <370818a61003150311ka793b76h74a4ec1f5288462a@mail.gmail.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1994358559==" Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org --===============1994358559== Content-Type: multipart/alternative; boundary=0016368e233d6a8a6d0481d419bb --0016368e233d6a8a6d0481d419bb Content-Type: text/plain; charset=ISO-8859-1 Hi all, I have the following questions regarding Xen hypervisor.Can you please clarify these queries? Does Xen follow any security model, in particular, does a Random Oracle (RO) fit in Xen? When there are concurrent Guest OS running on the same hardware, then there has to be a mechanism for concurrency control and fairness, how does Xen implement these? Shared memory access has to make sure that one "malicious" OS doesn't access other's memory, where and how is this done? Similarly with shared network, how and where is security handled in this case so that packets meant for one OS are not accessible to other OS? Does xen has cryptography implementation in the code ? If you have idea regarding *"provable security" *property of Xen , can you give us a gist of it ? Thanks&Regards, Aditya Pendyala, --0016368e233d6a8a6d0481d419bb Content-Type: text/html; charset=ISO-8859-1 Hi all,
I have the following questions regarding Xen hypervisor.Can you please clarify these queries?

  • Does Xen follow any security model, in particular, does a Random Oracle (RO) fit in Xen?
  • When there are concurrent Guest OS running on the same hardware, then there has to be a mechanism for concurrency control and fairness, how does Xen implement these?
  • Shared memory access has to make sure that one "malicious" OS doesn't access other's memory, where and how is this done?
  • Similarly with shared network, how and where is security handled in this case so that packets meant for one OS are not accessible to other OS?
  • Does xen has cryptography implementation in the code ?
  • If you have idea regarding "provable security" property of Xen , can you give us a gist of it ?


  • Thanks&Regards,
    Aditya Pendyala,

    --0016368e233d6a8a6d0481d419bb-- --===============1994358559== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel --===============1994358559==--