Skip to content

Commit 7bffc74

Browse files
author
transpute
committed
add papers & references
1 parent 66f5dc3 commit 7bffc74

5 files changed

Lines changed: 71 additions & 22 deletions

File tree

_includes/footer.html

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ <h2 class="footer-heading">{{ site.title }}</h2>
2222
</li>
2323
{% endif %}
2424

25-
2625
{% if site.github_wikipath %}
2726
<li>
2827
<a href="https://github.com/{{ site.github_wikipath }}">
@@ -36,6 +35,17 @@ <h2 class="footer-heading">{{ site.title }}</h2>
3635
</li>
3736
{% endif %}
3837

38+
{% if site.jira_url %}
39+
<li>
40+
<a href="{{ site.jira_url }}">
41+
<span class="icon icon--github">
42+
<img width=16 src="{{ site.baseurl }}/images/jira.png">
43+
</span>
44+
<span class="username">JIRA</span>
45+
</a>
46+
</li>
47+
{% endif %}
48+
3949
{% if site.googlegroup %}
4050
<li>
4151
<a href="https://groups.google.com/forum/#!forum/{{ site.googlegroup }}">

development.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ permalink: /development/
66

77
Please read the [contribution](https://github.com/OpenXT/openxt/wiki/Contributing) guidelines. There are 50+ source repositories on [Github](https://github.com/openxt), with [build instructions](https://github.com/OpenXT/openxt/wiki/How%20to%20build%20OpenXT). Issues and enhancements are tracked in [JIRA](https://openxt.atlassian.net).
88

9-
The documents below are dated, especially with respect to video architecture, but may be useful to new developers. They need to be converted to the Github wiki and edited to revise or remove dated sections.
9+
The documents below are dated, especially with respect to video architecture, but may be useful to new developers. They will be converted to the Github wiki and edited to revise or remove dated sections.
1010

1111
+ [OpenXT Architecture Guide](https://github.com/OpenXT-Extras/docs/blob/master/XTArchitectureGuide.pdf?raw=true)
1212
+ [OpenXT Appliance Developer Guide](https://github.com/OpenXT-Extras/docs/blob/master/XTEngineDeveloperGuide.pdf?raw=true)

history.md

Lines changed: 45 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,36 +6,47 @@ permalink: /history/
66

77
## Ecosystem
88

9-
2014 LinuxCon NA, [Security in the Cloud: Xen, KVM, Containers](http://www.slideshare.net/xen_com_mgr/lcna14-security-of-virtualization-solutions), *George Dunlap*
9+
2014
1010

11-
2014 Xen Summit, [Security and the Properties of a Xen Virtualization Platform](http://www.slideshare.net/xen_com_mgr/tricca-xen-summit2014), *Philip Tricca*.
11+
* LinuxCon NA, [Security in the Cloud: Xen, KVM, Containers](http://www.slideshare.net/xen_com_mgr/lcna14-security-of-virtualization-solutions), *George Dunlap*
1212

13-
2013 LinuxCon EU, [Securing your cloud with Xen's advanced security features](http://www.slideshare.net/xen_com_mgr/lceu13-securing-your-cloud-with-xens-advanced-security-features-ge), *George Dunlap* ([video](http://www.youtube.com/watch?v=fvW3kzl-bfY))
13+
* Xen Summit, [Security and the Properties of a Xen Virtualization Platform](http://www.slideshare.net/xen_com_mgr/tricca-xen-summit2014), *Philip Tricca*.
1414

15-
2013 Xen Summit, [In-Guest Mechanisms to Strengthen Guest Separation](http://www.slideshare.net/xen_com_mgr/xen-summit-2013triccastrengthen-guest-separation), *Philip Tricca*
15+
2013
1616

17-
2013 Xen Summit, [Secure Server Project](http://www.slideshare.net/xen_com_mgr/xen-summit2013-secureserverproject), *Jason Sonnek* ([video](http://www.youtube.com/watch?v=v_RJZTFcKoc))
17+
* LinuxCon EU, [Securing your cloud with Xen's advanced security features](http://www.slideshare.net/xen_com_mgr/lceu13-securing-your-cloud-with-xens-advanced-security-features-ge), *George Dunlap* ([video](http://www.youtube.com/watch?v=fvW3kzl-bfY))
18+
19+
* Xen Summit, [In-Guest Mechanisms to Strengthen Guest Separation](http://www.slideshare.net/xen_com_mgr/xen-summit-2013triccastrengthen-guest-separation), *Philip Tricca*
20+
21+
* Xen Summit, [Secure Server Project](http://www.slideshare.net/xen_com_mgr/xen-summit2013-secureserverproject), *Jason Sonnek* ([video](http://www.youtube.com/watch?v=v_RJZTFcKoc))
1822

1923
> Multi-Level (MLS) Hypervisor for Server
2024
21-
2012 Xen Summit, [&mu;-Xen](http://www.slideshare.net/xen_com_mgr/xen-14203926), *Ian Pratt*
25+
2012
26+
27+
* Xen Summit, [&mu;-Xen](http://www.slideshare.net/xen_com_mgr/xen-14203926), *Ian Pratt*
2228

2329
> Micro-Virtualization, Type-2 Hypervisor, VM Fork, Deprivileged Windows Host
2430
25-
2012 Xen Summit, [Xen and Client Virtualization: the case of XenClient XT](http://www.slideshare.net/xen_com_mgr/xen-and-client-virtualization-the-case-of-xenclient-xt), *Gianluca Guida*
31+
* Xen Summit, [Xen and Client Virtualization: the case of XenClient XT](http://www.slideshare.net/xen_com_mgr/xen-and-client-virtualization-the-case-of-xenclient-xt), *Gianluca Guida*
2632

2733
> Client Virtualization, VPN VM, Linux Stub Domains, Graphics Virtualization, Inter-VM Communication, SE Linux, Xen Security Modules (XSM), Dynamic Root of Trust Measurement (DRTM), Service VMs, Intel VT-d, Intel TXT.
2834
29-
2010 [Qubes OS Architecture](http://files.qubes-os.org/files/doc/arch-spec-0.3.pdf), *Joanna Rutkowska*
35+
2010
36+
37+
* [Qubes OS Architecture](http://files.qubes-os.org/files/doc/arch-spec-0.3.pdf), *Joanna Rutkowska*
3038

3139
> Secure GUI, Secure networking, Secure storage, Analysis of potential attack vectors
3240
33-
2007 Xen Summit, [Trusted Boot: Verifying the Xen Launch](http://www-archive.xenproject.org/files/xensummit_fall07/23_JosephCihula.pdf), *Joseph Cihula*
41+
2007
3442

43+
* Xen Summit, [Trusted Boot: Verifying the Xen Launch](http://www-archive.xenproject.org/files/xensummit_fall07/23_JosephCihula.pdf), *Joseph Cihula*
3544

3645
## Research
3746

38-
2011 ACM Symposium on Operating Systems Principles, [Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor](http://www.cs.ubc.ca/~andy/papers/xoar-sosp-final.pdf), *Patrick Colp et al.*
47+
2011
48+
49+
* ACM Symposium on Operating Systems Principles, [Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor](http://www.cs.ubc.ca/~andy/papers/xoar-sosp-final.pdf), *Patrick Colp et al.*
3950

4051
> "We present Xoar, a modified version of Xen that retrofits the modularity and
4152
isolation principles used in microkernels onto a mature virtualization platform.
@@ -45,14 +56,35 @@ benefits: sharing of service components by guests is configurable and auditable,
4556
making exposure to risk explicit, and access to the hypervisor is restricted
4657
to the least privilege required for each component."
4758

48-
2008 ACM Conference on Virtual Execution Environments, [Improving Xen Security through Disaggregation](https://www.cl.cam.ac.uk/research/srg/netos/papers/2008-murray2008improving.pdf), *Derek Murray et al.*
59+
2008
60+
61+
* ACM Conference on Virtual Execution Environments, [Improving Xen Security through Disaggregation](https://www.cl.cam.ac.uk/research/srg/netos/papers/2008-murray2008improving.pdf), *Derek Murray et al.*
4962

5063
> "We introduce our work to disaggregate the management virtual machine
5164
in a Xen-based system ... moves
5265
the domain builder, the most important privileged component, into a minimal
5366
trusted compartment. We illustrate how this approach may be used to implement
5467
“trusted virtualisation” and improve the security of virtual TPM implementations.
5568

56-
2006 USENIX Security, [Virtualizing the trusted platform module](https://www.usenix.org/event/sec06/tech/full_papers/berger/berger.pdf), *Stefan Berger et al.*
69+
2007
70+
71+
* ACM Workshop on New Security Paradigms, [Robustly Secure Computer Systems: A new security paradigm of system discontinuity](http://parsys.eecs.uic.edu/~solworth/solworth07systemDiscontinuity.pdf), *Jon A. Solworth*
72+
73+
2006
74+
75+
* *Computer* magazine, [Can We Make Operating Systems Reliable and Secure?](http://www.cs.vu.nl/~ast/publications/computer-2006a.pdf), *Andrew S. Tanenbaum et al.*
76+
* USENIX Security, [Virtualizing the Trusted Platform Module](https://www.usenix.org/event/sec06/tech/full_papers/berger/berger.pdf), *Stefan Berger et al.*
77+
78+
2003
79+
80+
* ACM Symposium on Operating Systems Principles, [Xen and the Art of Virtualization](http://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf), *Paul Barham et al.*
81+
82+
> "This paper presents Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource managed fashion, but without sacricing either performance or functionality."
83+
84+
1998
85+
86+
* USENIX Security, [The Flask Security Architecture: System Support for Diverse Security Policies](https://www.cs.cmu.edu/~dga/papers/flask-usenixsec99.pdf), *Ray Spencer et al.*
87+
88+
1981
5789

58-
1998 USENIX Security, [The flask security architecture: System support for diverse security policies](https://www.cs.cmu.edu/~dga/papers/flask-usenixsec99.pdf), *Ray Spencer et al.*
90+
* IBM Journal of Research & Development, [The Origin of the VM/370 Time-sharing System](http://lass.cs.umass.edu/~shenoy/courses/fall07/papers/vm370.pdf), *R.J. Creasy*

images/jira.png

264 Bytes
Loading

related.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,13 @@ permalink: /related/
2222
+ [Research](https://qubes-os.org/wiki/QubesResearch)
2323
+ [Users](https://groups.google.com/forum/#!forum/qubes-users) &middot; [Developers](https://groups.google.com/forum/#!forum/qubes-devel) &middot; [News](http://theinvisiblethings.blogspot.com/)
2424

25+
# Docker
26+
27+
> "... is an open platform for developers and sysadmins to build, ship, and run distributed applications ... Docker enables apps to be quickly assembled from components and eliminates the friction between development, QA, and production environments."
28+
29+
+ [History](http://en.wikipedia.org/wiki/Docker_%28software%29)
30+
+ [Software](https://www.docker.com/), USA
31+
2532
# Unikernels
2633

2734
+ C/Java: [Cloudius OSV](http://osv.io), *Israel*
@@ -36,18 +43,18 @@ permalink: /related/
3643

3744
# Ethos OS
3845

39-
> "... provides stronger security services which are more resistant to attack and abstractions which are less prone to abuse by attackers. As an example of the former, all networking in Ethos is encrypted, authenticated, and authorized. As an example of the latter, Ethos I/O is typed (as in programming languages) ensuring that I/O conforms to declared typed and thus preventing many attacks based on ill-formed input."
46+
> "... provides stronger security services which are more resistant to attack and abstractions which are less prone to abuse by attackers. As an example of the former, all networking in Ethos is encrypted, authenticated, and authorized. As an example of the latter, Ethos I/O is typed (as in programming languages) ensuring that I/O conforms to declared types and thus preventing many attacks based on ill-formed input."
4047
4148
+ [U of Illinois Research](https://www.ethos-os.org/), *USA*
4249

4350
# Proprietary
4451

45-
+ [Bromium vSentry](http://www.bromium.com/products/vsentry.html), *USA, UK*
52+
+ [Bromium &middot; vSentry](http://www.bromium.com/products/vsentry.html), *USA, UK*
4653
+ [Cloudozer](http://cloudozer.com/) &middot; [ Erlang on Xen](http://erlangonxen.org/), *UK, Germany*
47-
+ [Fox IT DataDiode](https://www.fox-it.com/en/products/datadiode/), *Netherlands*
48-
+ [Green Hills Integrity Multivisor](http://www.ghs.com/products/rtos/integrity_virtualization.html), *USA, UK*
54+
+ [Fox IT &middot; DataDiode](https://www.fox-it.com/en/products/datadiode/), *Netherlands*
55+
+ [Green Hills &middot; Integrity Multivisor](http://www.ghs.com/products/rtos/integrity_virtualization.html), *USA, UK*
4956
+ [Moka5](http://www.moka5.com/), *USA*
50-
+ [Raytheon Trusted Thin Client](https://www.trustedcs.com/products/TrustedThinClient.html), *USA*
51-
+ [Secunet SINA Virtual Workstation](http://www.secunet.com/en/topics-solutions/high-security/sina/sina-workstation/), *Germany*
52-
+ [Tresys VMFortress](http://www.tresys.com/products/vm-fortress.php), *USA*
57+
+ [Raytheon &middot; Trusted Thin Client](https://www.trustedcs.com/products/TrustedThinClient.html), *USA*
58+
+ [Secunet &middot; SINA Virtual Workstation](http://www.secunet.com/en/topics-solutions/high-security/sina/sina-workstation/), *Germany*
59+
+ [Tresys &middot; VMFortress](http://www.tresys.com/products/vm-fortress.php), *USA*
5360

0 commit comments

Comments
 (0)