Pocket Hypervisors: Opportunities and Challenges

In this position paper, we explore the opportunities and challenges of running pocket hypervisors on commodity mobile devices through four proposed applications: secure operating systems, security services, mobile testbeds, and opportunistic sensor networks. We believe that pocket hypervisors can benefit mobile computing, but that mobility presents several important and unique challenges to virtualization.

[1]  David E. Irwin,et al.  Sharing Networked Resources with Brokered Leases , 2006, USENIX Annual Technical Conference, General Track.

[2]  Manpreet Singh,et al.  Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[3]  Daniel R. Ferstay,et al.  Fast Secure Virtualization for the ARM Platform , 2006 .

[4]  Ramón Cáceres,et al.  Reincarnating PCs with portable SoulPads , 2005, MobiSys '05.

[5]  Landon P. Cox,et al.  Presence-Exchanges: Toward Sustainable Presence-Sharing , 2006, Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement).

[6]  Amin Vahdat,et al.  ECOSystem: managing energy as a first class operating system resource , 2002, ASPLOS X.

[7]  Samuel T. King,et al.  ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.

[8]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[10]  Samuel T. King,et al.  Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.

[11]  Liviu Iftode,et al.  Scylla: a smart virtual machine for mobile embedded systems , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.

[12]  Tal Garfinkel,et al.  Virtual machine monitors: current technology and future trends , 2005, Computer.

[13]  Scott Devine,et al.  Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.

[14]  Samuel T. King,et al.  Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.

[15]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[16]  Tristan Henderson,et al.  The changing usage of a mature campus-wide wireless network , 2004, MobiCom '04.

[17]  Mark D. Corner,et al.  LLAMA : An Adaptive Strategy for Utilizing Excess Energy to Perform Background Tasks on Mobile Devices , 2006 .

[18]  Mahadev Satyanarayanan,et al.  Towards seamless mobility on pervasive hardware , 2005, Pervasive Mob. Comput..

[19]  Larry L. Peterson,et al.  Experiences building PlanetLab , 2006, OSDI '06.

[20]  Michael Vrable,et al.  Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.

[21]  Philip Levis,et al.  Maté: a tiny virtual machine for sensor networks , 2002, ASPLOS X.