skip to main content
tutorial

Safe Inspection of Live Virtual Machines

Published:08 April 2017Publication History
Skip Abstract Section

Abstract

With DevOps automation and an everything-as-code approach to lifecycle management for cloud-native applications, challenges emerge from an operational visibility and control perspective. Once a VM is deployed in production it typically becomes a hands-off entity in terms of restrictions towards inspecting or tuning it, for the fear of negatively impacting its operation. We present CIVIC (Cloning and Injection based VM Inspection for Cloud), a new mechanism that enables safe inspection of unmodified production VMs on-the-fly. CIVIC restricts all impact and side-effects of inspection or analysis operations inside a live clone of the production VM. New functionality over the replicated VM state is introduced using code injection. In this paper, we describe the design and implementation of our solution over KVM/QEMU. We demonstrate four of its use-cases-(i) safe reuse of system monitoring agents, (ii) impact-heavy problem diagnostics and troubleshooting, (iii) attaching an intrusive anomaly detector to a live service, and (iv) live tuning of a webserver's configuration parameters. Our evaluation shows CIVIC is nimble and lightweight in terms of memory footprint as well as clone activation time (6.5s), and has a low impact on the original VM (< 10%).

References

  1. Amos Waterland. Stress. http://people.seas.harvard.edu/apw/stress/.Google ScholarGoogle Scholar
  2. Anthony Liguori and Stefan Hajnoczi. QEMU Snapshots. http://wiki.qemu.org/Documentation/CreateSnapshot and http://wiki.qemu.org/Features/Snapshots2.Google ScholarGoogle Scholar
  3. Caleb Gilbert. Scaling Drupal: HTTP pipelining and benchmarking revisited. http://rocketmodule.com/blog/scaling-drupal-http-pipelining-and-benchmarking-revisited/.Google ScholarGoogle Scholar
  4. Daniel Stenberg. PHP cURL Manual. http://no1.php.net/manual/en/intro.curl.php.Google ScholarGoogle Scholar
  5. Jonathan Corbet and Andrea Arcangeli. Page faults in user space. http://lwn.net/Articles/615086/.Google ScholarGoogle Scholar
  6. Alexey Kopytov. SysBench Manual. http://sysbench.sourceforge.net/docs/#database_mode.Google ScholarGoogle Scholar
  7. Amazon. Summary of the October 22,2012 AWS Service Event in the US-East Region. https://aws.amazon.com/message/680342/.Google ScholarGoogle Scholar
  8. Andrea Arcangeli. Linux Userfault. https://kernel.googlesource.com/pub/scm/linux/kernel/git/andrea/aa/+/userfault.Google ScholarGoogle Scholar
  9. Angelo Laub. Practical Mac OS X Insecurity. https://events.ccc.de/congress/2004/fahrplan/files/95-macosx-insecurity-paper.pdf.Google ScholarGoogle Scholar
  10. P. Barford and M. Crovella. Generating representative web workloads for network and server performance evaluation. In Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '98/PERFORMANCE '98, pages 151--160, New York, NY, USA, 1998. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Butt, H. A. Lagar-Cavilla, A. Srivastava, and V. Ganapathy. Self-service cloud computing. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 253--264, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Carbone, M. Conover, B. Montague, and W. Lee. Secure and robust monitoring of virtual machines through guest-assisted introspection. In Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses, RAID'12, pages 22--41, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Cassandra. Bug 5064: Alter table when it includes collections makes cqlsh hang. https://issues.apache.org/jira/browse/CASSANDRA-5064.Google ScholarGoogle Scholar
  14. J. Chen, S. Ghanbari, F. Iorio, A. B. Hashemi, and C. Amza. Ensemble: A tool for performance modeling of applications in cloud data centers. In IEEE TRANSACTIONS ON CLOUD COMPUTING, SPECIAL ISSUE ON SCIENTIFIC CLOUD COMPUTING, 2015.Google ScholarGoogle Scholar
  15. P. M. Chen and B. D. Noble. When virtual is better than real. In HotOS, pages 133--138, 2001.Google ScholarGoogle Scholar
  16. T.-c. Chiueh, M. Conover, and B. Montague. Surreptitious deployment and execution of kernel agents in windows guests. In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012), CCGRID '12, pages 507--514, Washington, DC, USA, 2012. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In USENIX 2008 Annual Technical Conference on Annual Technical Conference, pages 1--14, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. I.-H. Chung and J. K. Hollingsworth. Automated cluster-based web service performance tuning. In Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing, HPDC '04, pages 36--44, Washington, DC, USA, 2004. IEEE Computer Society.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Colohan. The Scariest Outage Ever. CMU SDI/ISTC Seminar Series. http://www.pdl.cmu.edu/SDI/2012/083012b.html, 2012.Google ScholarGoogle Scholar
  20. B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears. Benchmarking cloud serving systems with ycsb. In Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC '10, pages 143--154, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: A safe execution environment for commodity operating systems. SIGOPS Oper. Syst. Rev., 41(6):351--366, Oct. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. L. Cui, B. Li, Y. Zhang, and J. Li. Hotsnap: A hot distributed snapshot system for virtual machine cluster. In Proceedings of the 27th International Conference on Large Installation System Administration, LISA'13, pages 59--73, Berkeley, CA, USA, 2013. USENIX Association.Google ScholarGoogle Scholar
  23. B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pages 161--174. San Francisco, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Dave Gilbert. PostCopyLiveMigration. http://wiki.qemu.org/Features/PostCopyLiveMigration.Google ScholarGoogle Scholar
  25. Dave Gilbert. PostCopyLiveMigration. https://github.com/orbitfp7/qemu/tree/wp3-postcopy.Google ScholarGoogle Scholar
  26. D. J. Dean, H. Nguyen, X. Gu, H. Zhang, J. Rhee, N. Arora, and G. Jiang. Perfscope: Practical online server performance bug inference in production cloud computing infrastructures. In Proceedings of the ACM Symposium on Cloud Computing, SOCC '14, pages 8:1--8:13, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. Diao, J. L. Hellerstein, S. Parekh, and J. P. Bigus. Managing web server performance with autotune agents. IBM Systems Journal, 42(1):136--149, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In IEEE Security and Privacy '11, pages 297--312.Google ScholarGoogle Scholar
  29. Y. Dong, W. Ye, Y. Jiang, I. Pratt, S. Ma, J. Li, and H. Guan. Colo: Coarse-grained lock-stepping virtual machines for non-stop service. In Proceedings of the 4th Annual Symposium on Cloud Computing, SOCC '13, pages 3:1--3:16, New York, NY, USA, 2013. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36(SI):211--224, Dec. 2002.Google ScholarGoogle Scholar
  31. EMC. VNX Snapshots White Paper. https://www.emc.com/collateral/software/white-papers/h10858-vnx-snapshots-wp.pdf.Google ScholarGoogle Scholar
  32. Florian octo Forster. Collectd: The system statistics collection daemon. https://collectd.org/.Google ScholarGoogle Scholar
  33. Y. Fu and Z. Lin. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. In IEEE Security&Privacy'12.Google ScholarGoogle Scholar
  34. Y. Fu and Z. Lin. Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery. In Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '13, pages 97--110, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Y. Fu, J. Zeng, and Z. Lin. Hypershell: A practical hypervisor layer guest os shell for automated in-vm management. In Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, USENIX ATC'14, pages 85--96, 2014.Google ScholarGoogle Scholar
  36. A. Ganjali and D. Lie. Auditing cloud management using information flow tracking. In Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, STC '12, pages 79--84, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS, pages 191--206, 2003.Google ScholarGoogle Scholar
  38. S. Ghanbari, A. B. Hashemi, and C. Amza. Stage-aware anomaly detection through tracking log points. In Proceedings of the 15th International Middleware Conference, Middleware '14, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. G. R. Goodson, S. Susarla, and K. Srinivasan. System and method for fast restart of a guest operating system in a virtual machine environment, Aug. 23 2011. US Patent 8,006,079.Google ScholarGoogle Scholar
  40. Z. Gu, Z. Deng, D. Xu, and X. Jiang. Process implanting: A new active introspection framework for virtualization. In Reliable Distributed Systems (SRDS), 2011 30th IEEE Symposium on, pages 147--156. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. R. Hines and K. Gopalan. Post-copy based live virtual machine migration using adaptive pre-paging and dynamic self-ballooning. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '09, pages 51--60, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. J. Hizver and T.-c. Chiueh. Real-time deep virtual machine introspection and its applications. In Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '14, pages 3--14, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. J. Humble and D. Farley. Continuous delivery: reliable software releases through build, test, and deployment automation. Pearson Education, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. IBM. BigFix / Endpoint Manager. https://github.com/bigfix/platform-releases.Google ScholarGoogle Scholar
  45. A. Kangarlou, P. Eugster, and D. Xu. Vnsnap: Taking snapshots of virtual networked environments with minimal downtime. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pages 524--533. IEEE, 2009. Google ScholarGoogle ScholarCross RefCross Ref
  46. S. T. King, G. W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In Proceedings of the annual conference on USENIX Annual Technical Conference, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Konstantin Boudnik. Hadoop: Code Injection, Distributed Fault Injection. http://www.boudnik.org/~cos/docs/Hadoop-injection.pdf.Google ScholarGoogle Scholar
  48. T. Kurze, M. Klems, D. Bermbach, A. Lenk, S. Tai, and M. Kunze. Cloud federation. In Proceedings of the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2011.Google ScholarGoogle Scholar
  49. H. A. Lagar-Cavilla, J. A. Whitney, A. M. Scannell, P. Patchin, S. M. Rumble, E. de Lara, M. Brudno, and M. Satyanarayanan. Snowflock: Rapid virtual machine cloning for cloud computing. In EuroSys, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. A. Lakshman and P. Malik. Cassandra: A decentralized structured storage system. SIGOPS Oper. Syst. Rev., 44(2):35--40, Apr. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. M. Le and Y. Tamir. Fault injection in virtualized systems-challenges and applications. Dependable and Secure Computing, IEEE Transactions on, 12(3):284--297, May 2015.Google ScholarGoogle Scholar
  52. Linux man page. Chroot. http://linux.die.net/man/1/chroot.Google ScholarGoogle Scholar
  53. Linux man page. chrt - manipulate real-time attributes of a process. http://linux.die.net/man/1/chrt.Google ScholarGoogle Scholar
  54. Matthew H. Intel SGX for Dummies (Intel SGX Design Objectives). https://software.intel.com/en-us/blogs/2013/09/26/protecting-application-secrets-with-intel-sgx.Google ScholarGoogle Scholar
  55. Microsoft Azure. VM Agent and Extensions. https://azure.microsoft.com/en-us/blog/vm-agent-and-extensions-part-2/.Google ScholarGoogle Scholar
  56. M. J. Mior and E. de Lara. Flurrydb: A dynamically scalable relational database with virtual machine cloning. In 4th Annual International Systems and Storage Conference, Haifa, Israel, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. D. Mosberger and T. Jin. httperf - a tool for measuring web server performance. SIGMETRICS Perform. Eval. Rev., 26(3):31--37, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Nemo. Abusing Mach on Mac OS X. http://uninformed.org/index.cgi?v=4&a=3.Google ScholarGoogle Scholar
  59. OpenBenchmarking/Phoronix. x264 Test Profile. http://openbenchmarking.org/test/pts/x264-1.7.0.Google ScholarGoogle Scholar
  60. OW2 Consortium. RUBiS: Rice University Bidding System. http://rubis.ow2.org/.Google ScholarGoogle Scholar
  61. Patrick Colp. VM Snapshots. http://www-archive.xenproject.org/files/xensummit_oracle09/VMSnapshots.pdf.Google ScholarGoogle Scholar
  62. PHP. Bug 45161 and 65458. https://bugs.php.net/bug.php?id=45161 and https://bugs.php.net/bug.php?id=65458.Google ScholarGoogle Scholar
  63. B. Procházka, T. Vojnar, and M. Drahansky. Hijacking the linux kernel. In MEMICS, pages 85--92, 2010.Google ScholarGoogle Scholar
  64. QEMU. Documentation/Debugging: Using gdb. http://wiki.qemu.org/Documentation/Debugging.Google ScholarGoogle Scholar
  65. Russell Coker. Bonnie++. http://www.coker.com.au/bonnie++/.Google ScholarGoogle Scholar
  66. A. Saberi, Y. Fu, and Z. Lin. Hybrid-bridge: Efficiently bridging the semantic-gap in vmi via decoupled execution and training memoization. In NDSS, 2014.Google ScholarGoogle Scholar
  67. A. Saboori, G. Jiang, and H. Chen. Autotuning configurations in distributed systems for performance improvements using evolutionary strategies. In Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, ICDCS '08, pages 769--776, Washington, DC, USA, 2008. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. T.-I. Salomie, G. Alonso, T. Roscoe, and K. Elphinstone. Application level ballooning for efficient server consolidation. In Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys '13, pages 337--350, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. B. Satzger, W. Hummer, C. Inzinger, P. Leitner, and S. Dustdar. Winds of change: From vendor lock-in to the meta cloud. IEEE Internet Computing, 17(1):69--73, Jan. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. B. Shi, B. Li, L. Cui, J. Zhao, and J. Li. Syncsnap: Synchronized live memory snapshots of virtual machine networks. In 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), pages 490--497, Aug 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. L. M. Silva, J. Alonso, P. Silva, J. Torres, and A. Andrzejak. Using virtualization to improve software rejuvenation. In Network Computing and Applications, 2007. NCA 2007. Sixth IEEE International Symposium on, pages 33--44. IEEE, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  72. D. Srinivasan and X. Jiang. Time-traveling forensic analysis of vm-based high-interaction honeypots. In Security and Privacy in Communication Networks, pages 209--226. 2012. Google ScholarGoogle ScholarCross RefCross Ref
  73. D. Srinivasan, Z. Wang, X. Jiang, and D. Xu. Process out-grafting: An efficient "out-of-vm" approach for fine-grained process execution monitoring. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pages 363--374, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Stanley Cen. Mac OS X Code Injection and Reverse Engineering. http://stanleycen.com/blog/mac-osx-code-injection/.Google ScholarGoogle Scholar
  75. R. Sun, J. Yang, Z. Gao, and Z. He. Lsovc: A framework for taking live snapshot of virtual cluster in the cloud. In 2013 IEEE 10th International Conference on High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pages 1727--1732, Nov 2013. Google ScholarGoogle ScholarCross RefCross Ref
  76. S. Suneja, C. Isci, V. Bala, E. de Lara, and T. Mummert. Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '14, pages 249--261, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. S. Suneja, C. Isci, E. de Lara, and V. Bala. Exploring vm introspection: Techniques and trade-offs. In Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '15, pages 133--146, New York, NY, USA, 2015. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Y. Tamura. Kemari: Fault tolerant vm synchronization based on kvm. 2010.Google ScholarGoogle Scholar
  79. Tim Starling. Measuring memory usage with strace. http://tstarling.com/blog/2010/06/measuring-memory-usage-with-strace/.Google ScholarGoogle Scholar
  80. Vasilis Liaskovitis, Igor Mammedov, et. al. ACPI memory hotplug. https://lists.gnu.org/archive/html/qemu-devel/2014-04/msg00734.html.Google ScholarGoogle Scholar
  81. N. Viennot, S. Nair, and J. Nieh. Transparent mutable replay for multicore debugging and patch validation. In Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '13, pages 127--138, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. VMware. Guest Operating System Customization Requirements. https://pubs.vmware.com/vsphere-51/index.jsp#com.vmware.vsphere.vm_admin.doc/GUID-E63B6FAA-8D35-428D-B40C-744769845906.html.Google ScholarGoogle Scholar
  83. VMware. Understanding Clones. https://www.vmware.com/support/ws5/doc/ws_clone_overview.html.Google ScholarGoogle Scholar
  84. VMware. VMCI Sockets Documentation. www.vmware.com/support/developer/vmci-sdk/.Google ScholarGoogle Scholar
  85. VMware. VMWare Tools. http://kb.vmware.com/kb/340.Google ScholarGoogle Scholar
  86. S. Vogl, F. Kilic, C. Schneider, and C. Eckert. X-tier: Kernel module injection. In J. Lopez, X. Huang, and R. Sandhu, editors, Network and System Security, volume 7873 of Lecture Notes in Computer Science, pages 192--205. Springer Berlin Heidelberg, 2013.Google ScholarGoogle Scholar
  87. E. Warszawski and M. Ben-Yehuda. Fast initiation of workloads using memory-resident post-boot snapshots, Nov. 3 2015. US Patent App. 14/930,674.Google ScholarGoogle Scholar
  88. J. Wettinger, U. Breitenbücher, and F. Leymann. Standards-based devops automation and integration using tosca. In Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, UCC '14, pages 59--68, Washington, DC, USA, 2014. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. R. Wu, P. Chen, P. Liu, and B. Mao. System call redirection: A practical approach to meeting real-world virtual machine introspection needs. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on, pages 574--585, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. X. Wu, Z. Shen, R. Wu, and Y. Lin. Jump-start cloud: efficient deployment framework for large-scale cloud applications. Concurrency and Computation: Practice and Experience, 24(17):2120--2137, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Xen Project Blog. Debugging on xen. https://blog.xenproject.org/2009/10/21/debugging-on-xen/.Google ScholarGoogle Scholar
  92. Xen Project Wiki. Blktap. http://wiki.xenproject.org/wiki/Blktap.Google ScholarGoogle Scholar
  93. Xen Project Wiki. Migration. http://wiki.xenproject.org/wiki/Migration.Google ScholarGoogle Scholar
  94. Xen.org: Sean Dague, Daniel Stekloff, Reiner Sailer, and Stefan Berger. Xen Management User Interface. http://xenbits.xen.org/docs/4.3-testing/man/xm.1.html#block_devices.Google ScholarGoogle Scholar
  95. Yasuaki Ishimatsu. Memory Hotplug. http://events.linuxfoundation.org/sites/events/files/lcjp13_ishimatsu.pdf.Google ScholarGoogle Scholar
  96. J. Zeng, Y. Fu, and Z. Lin. Pemu: A pin highly compatible out-of-vm dynamic binary instrumentation framework. In Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE '15, pages 147--160, New York, NY, USA, 2015. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. ZeroTurnaround. JRebel Java Plugin. http://zeroturnaround.com/software/jrebel/.Google ScholarGoogle Scholar
  98. F. Zhang, J. Cao, L. Liu, and C. Wu. Fast autotuning configurations of parameters in distributed computing systems using ordinal optimization. In Proceedings of the 2009 International Conference on Parallel Processing Workshops, ICPPW '09, pages 190--197, Washington, DC, USA, 2009. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. W. Zheng, R. Bianchini, G. J. Janakiraman, J. R. Santos, and Y. Turner. Justrunit: Experiment-based management of virtualized data centers. In Proc. USENIX Annual technical conference, pages 18--18, 2009.Google ScholarGoogle Scholar
  100. W. Zheng, R. Bianchini, and T. D. Nguyen. Automatic configuration of internet services. SIGOPS Oper. Syst. Rev., 41(3):219--229, Mar. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. J. Zhi, S. Suneja, and E. De Lara. The case for system testing with swift hierarchical vm fork. In Proceedings of the 6th USENIX Conference on Hot Topics in Cloud Computing, HotCloud'14, pages 19--19, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. J. Zhu, Z. Jiang, and Z. Xiao. Twinkle: A fast resource provisioning mechanism for internet services. In INFOCOM, 2011 Proceedings IEEE, pages 802--810, 2011. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Safe Inspection of Live Virtual Machines

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in

                      Full Access

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader
                      About Cookies On This Site

                      We use cookies to ensure that we give you the best experience on our website.

                      Learn more

                      Got it!