Sept 3: Welcome. Be prepared to talk about your computing background. What do you know about operating systems, assembly language, and computer architecture. Do you know how to program? What languages?
|Lecture:||Wednesday 5:00 -- 7:00 PM Location: 312|
|Instructor:||Larry Rudolph, email@example.com|
After Class or by appointment|
|Prerequisites:||Operating Systems, programming.|
|(Optional) Text book:||
Authors: James E. Smith and Ravi Nair |
Title: Virtual Machines
Publisher: Morgan Kaufmann
||Introduction: What is a virtual machine; Simulation vs Emulation
||Formal Requirements of Virtualization '74
||Read by Sept 10
||Instruction Set Architectures, Sensitive Instructions
|Install QEMU and Risc-V QEMU
|| Memory Management
||Trace Cache Management
||Device and Network Virtualization
||Slides (IO Devices)
Virtual WiFi Paper
|Add a device
||Slides (HW support)
Intel Virt Support
HW v SW Comparison
|Measure Virtualization Costs
||Migrations, KVM, Containers||Slides (HW support)
VM vs Containers
KVM for Server
KVM for ARM KVM for ARM 1
|| Overshadow and SGX
Good Bad Ugly>
|Who does it?
||Virtualized Network, Software Defined Networks, Data Centers
Virt Network Concepts
HP's Virt Network Concepts
Software Defined Networks
Network Aware VM Placement
||Mobile Phone Virtualization -- II
SOSP Talk (Video)
||JVM/Dalvik: Tinting and Object Tracing
Tainting/Object Tracing in Android
Aurasium Andoid Security (ppt)d
Backgroud Material: Million Watchpoints
Early Tainting Paper (Chow)
Newer Papers: DroidScope
2014 Thesis expanding TaintDroid
||Virtual Data Center: OpenStack
|| Large Number of Slides
||Hacking Day -- No Class
||Storage Virutalization, Beaker
||The future of Virtualization
|| Slides with notes
PetaScale Ocean Virt
ARM Virtualization Future
Some Past Predictions
Naive Cloud Predictions
Grades are based problem sets, a midterm and final project.
The weighting will be:
This is a graduate level class, so after mastering and understanding the basic technology, the final project will be doing something novel with virtual machines, such as: creating a mock-device driver to protect personal information, protecting against buffer-overflow attacks, identifying which job is running, intelligent checkpoint-restart, capturing messages before they are encrypted, and deceptive information dispersal.
The midterm will be given on Oct 22.
Projects can be done in groups but all presentations will be given to the class. Nov 26 Class (Thanksgiving Eve) will depend on the number of presentations.
Problem Sets (Usually involves programming) are due two weeks after assigned.
Extra credit given for telling the class about current news articles concerning virtualization.
|Academic integrity policy:||http://cs.nyu.edu/web/Academic/Graduate/academic_integrity.html|