Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3130379.3130605guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

MobiXen: porting xen on Android devices for mobile virtualization

Published: 27 March 2017 Publication History

Abstract

The mobile virtualization technology provides a feasible way to improve the manageability and security for embedded systems. This paper presents an architecture named MobiXen to address these challenges. In the MobiXen, both Xen's physical memory space and virtual address space are shrunk as much as possible and thus Android owns more memory resource; optimizations are developed to reduce the virtualization overhead when Android is accessing system resources; new policies are implemented to achieve low suspend/resume latency. With these work adopted, MobiXen is customized as a high efficient mobile hypervisor. Detailed implementations shows that, most of the performance degradation brought by MobiXen is less than 3%, which is imperceptible by end users.

References

[1]
J. Ren, Y. Qi, Y. Dai, X. Wang, and Y. Shi, "Appsec: A safe execution environment for security sensitive applications," in Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, ser. VEE '15, 2015, pp. 187--199.
[2]
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel, "Inktag: Secure applications on an untrusted operating system," in Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ser. ASPLOS '13. New York, NY, USA: ACM, 2013, pp. 265--278. {Online}. Available
[3]
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports, "Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems," in Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). New York, NY, USA: ACM, 2008, pp. 2--13.
[4]
A. Baumann, M. Peinado, and G. Hunt, "Shielding applications from an untrusted cloud with haven," in Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, Oct. 2014, pp. 267--283.
[5]
A. Srivastava, H. Raj, J. Giffin, and P. England, "Trusted vm snapshots in untrusted cloud infrastructures," In proceedings of 15th International Symposium On Research in Attacks, Intrusions and Defenses (RAID) Symposium, 2012.
[6]
H. Chen, R. Chen, F. Zhang, B. Zang, and P.-C. Yew, "Live updating operating systems using virtualization," In proceedings of the 2nd International Conference on Virtual Execution Environments(VEE), pp. 35--44, June 2006.
[7]
Xen, "Xen power management," http://wiki.xen.org/wiki/Xen_power_management.
[8]
R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. C. Martins, A. V. Anderson, S. M. Bennett, A. Kagi, F. H. Leung, and L. Smith, "Intel virtualization technology," In proceedings of IEEE Computer Society Press, pp. 48--56, May 2005.

Cited By

View all
  1. MobiXen: porting xen on Android devices for mobile virtualization

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    DATE '17: Proceedings of the Conference on Design, Automation & Test in Europe
    March 2017
    1814 pages

    Publisher

    European Design and Automation Association

    Leuven, Belgium

    Publication History

    Published: 27 March 2017

    Author Tags

    1. Android
    2. Xen
    3. hypervisor
    4. mobile virtualization

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)98
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media