Results 1 - 10
of
53
Unmodified device driver reuse and improved system dependability via virtual machines
- In Proceedings of the 6th Symposium on Operating Systems Design and Implementation
, 2004
"... We propose a method to reuse unmodified device drivers and to improve system dependability using virtual machines. We run the unmodified device driver, with its original operating system, in a virtual machine. This approach enables extensive reuse of existing and unmodified drivers, independent of t ..."
Abstract
-
Cited by 134 (8 self)
- Add to MetaCart
We propose a method to reuse unmodified device drivers and to improve system dependability using virtual machines. We run the unmodified device driver, with its original operating system, in a virtual machine. This approach enables extensive reuse of existing and unmodified drivers, independent
SIDE: Isolated and Efficient Execution of Unmodified Device Drivers
"... Abstract—Buggy device drivers are a major threat to the reliability of their host operating system. There have been myriad attempts to protect the kernel, but most of them either required driver modifications or incur substantial performance overhead. This paper describes an isolated device driver e ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
execution system called SIDE (Streamlined Isolated Driver Execution), which focuses specifically on unmodified device drivers and strives to avoid changing the existing kernel code as much as possible. SIDE exploits virtual memory hardware to set up a device driver execution environment that is compatible
Safe hardware access with the Xen virtual machine monitor
- In 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS
, 2004
"... The Xen virtual machine monitor allows multiple operating systems to execute concurrently on commodity x86 hardware, providing a solution for server consolidation and utility computing. In our initial design, Xen itself contained device-driver code and provided safe shared virtual device access. In ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
. In this paper we present our new Safe Hardware Interface, an isolation architecture used within the latest release of Xen which allows unmodified device drivers to be shared across isolated operating system instances, while protecting individual OSs, and the system as a whole, from driver failure. 1
The Fluke Device Driver Framework
, 1999
"... Providing efficient device driver support in the Fluke operating system presents novel challenges, which stem from two conflicting factors: (i) a design and maintenance requirement to reuse unmodified legacy device drivers, and (ii) the mismatch between the Fluke kernel's internal execution env ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
Providing efficient device driver support in the Fluke operating system presents novel challenges, which stem from two conflicting factors: (i) a design and maintenance requirement to reuse unmodified legacy device drivers, and (ii) the mismatch between the Fluke kernel's internal execution
Tolerating malicious device drivers in linux
- In USENIX ATC
, 2010
"... This paper presents SUD, a system for running existing Linux device drivers as untrusted user-space processes. Even if the device driver is controlled by a malicious adversary, it cannot compromise the rest of the system. One significant challenge of fully isolating a driver is to confine the action ..."
Abstract
-
Cited by 27 (3 self)
- Add to MetaCart
the actions of its hardware device. SUD relies on IOMMU hardware, PCI express bridges, and message-signaled interrupts to confine hardware devices. SUD runs unmodified Linux device drivers, by emulating a Linux kernel environment in user-space. A prototype of SUD runs drivers for Gigabit Ethernet, 802
The Flux OSKit: A Substrate for Kernel and Language Research
, 1997
"... Abstract Implementing new operating systems is tedious, costly, and often impractical except for large projects. The Flux OSKit addresses this problem in a novel way by providing clean, well-documented OS components designed to be reused in a wide variety of other environments, rather than defining ..."
Abstract
-
Cited by 138 (1 self)
- Add to MetaCart
defining a new OS structure. The OSKit uses unconventional techniques to maximize its usefulness, such as intentionally exposing implementation details and platform-specific facilities. Further, the OSKit demonstrates a technique that allows unmodified code from existing mature operating systems
Linux Device Driver Emulation in Mach
- In Proc. of the Annual USENIX 1996 Technical Conf
, 1996
"... We describe the design and performance of code added to the Mach microkernel (Mach 4.0, version UK02p21) that permits one to build a Mach kernel that includes unmodified Linux device drivers. We have written emulation code to support all Linux 1.3.35 network and SCSI drivers for the ISA and PCI I/O ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
We describe the design and performance of code added to the Mach microkernel (Mach 4.0, version UK02p21) that permits one to build a Mach kernel that includes unmodified Linux device drivers. We have written emulation code to support all Linux 1.3.35 network and SCSI drivers for the ISA and PCI I
PUCs: Detecting Transparent, Passive Untouched Capacitive Widgets on Unmodified Multi-touch Displays
"... Capacitive multi-touch displays are not designed to detect passive objects placed on them—in fact, these systems usually contain filters to actively reject such touch data. We present a technical analysis of this problem and introduce Passive Untouched Capacitive Widgets (PUCs). Unlike previous appr ..."
Abstract
-
Cited by 6 (3 self)
- Add to MetaCart
approaches, PUCs do not require power, they can be made entirely transparent, they are detected reliably even when no user is touching them, and they do not require internal electrical or software modifications of the touch display or its driver. We show the results from testing PUCs on 17 different off
A Sledgehammer Approach to Reuse of Legacy Device Drivers
"... Device drivers account for the majority of an operating system’s code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New operating systems should benefit from the existing device driver code base without demanding legacy support from the kerne ..."
Abstract
- Add to MetaCart
the kernel. Instead of trying to directly integrate existing device drivers we propose a more radical approach. We run the unmodified device driver, with its complete original OS, isolated in a virtual machine. Our flexible approach, requiring only minimal support infrastructure, allows us to run any
Device Driver-enabled Wireless Network Emulation
"... ABSTRACT Testing and evaluating the performance of actual software for wireless networks is difficult. Real-world wireless testbeds are costly and cumbersome to maintain. Measurement studies are complicated by many uncontrollable environmental influences, particularly the wireless channel. Network ..."
Abstract
- Add to MetaCart
emulation architecture for the evaluation of wireless communication software. By bridging the gap between simulation and wireless software using a custom device driver, our framework enables arbitrary and unmodified wireless communication software to be evaluated in a fully simulated network. In accordance
Results 1 - 10
of
53