The Experts below are selected from a list of 357 Experts worldwide ranked by ideXlab platform
Kenneth Van Surksum - One of the best experts on this subject based on the ideXlab platform.
-
release Vmware Workstation 12 pro player 12 fusion 8 and fusion pro 8
www.virtualization.info, 2015Co-Authors: Kenneth Van SurksumAbstract:Vmware today released version 12 of its type-2 client hypervisor products for Microsoft Windows: Workstation Pro and Player and version 8 of its client hypervisor ...
-
Vmware releases technology preview of next version of Workstation
www.virtualization.info, 2013Co-Authors: Kenneth Van SurksumAbstract:Vmware has released a technology preview of the next version of its desktop virtualization platform Vmware Workstation, which will most likely receive version 9.1 once ...
-
release Vmware Workstation 9 0 2 player 5 0 2
www.virtualization.info, 2013Co-Authors: Kenneth Van SurksumAbstract:Vmware has released version 9.0.2 of its desktop virtualization platform Workstation and released version 5.0.2 of Player This version is the follow-up of version 9.0.1 ...
-
release Vmware Workstation 9 0 1
www.virtualization.info, 2011Co-Authors: Kenneth Van SurksumAbstract:Vmware has released version 9.0.1 of its desktop virtualization platform Workstation. This maintenance release can be installed on top of version 9.0 which was released ...
-
release Vmware Workstation 7 1 4 player 3 1 4 ace 2 7 4
www.virtualization.info, 2011Co-Authors: Kenneth Van SurksumAbstract:Vmware has updated its virtualization platform Workstation and Player and platform wrapper product ACE to build 385536. Besides fixing security issues and known problems this ...
Massimo Ferrari - One of the best experts on this subject based on the ideXlab platform.
-
Release: Vmware Workstation 11 & Fusion 7 Technology Preview 2014
2014Co-Authors: Massimo FerrariAbstract:This week Vmware has provided access to the Technology Preview 2014 of its desktop virtualization platforms: Workstation 11 and Fusion 7. The main highlights of ...
-
release Vmware Workstation 11 fusion 7 technology preview 2014
www.virtualization.info, 2014Co-Authors: Massimo FerrariAbstract:This week Vmware has provided access to the Technology Preview 2014 of its desktop virtualization platforms: Workstation 11 and Fusion 7. The main highlights of ...
-
Release: Vmware Workstation 10
2012Co-Authors: Massimo FerrariAbstract:Together with the release of Vmware Fusion 6, Vmware released version 10 of its counterpart in desktop virtualization platforms for Microsoft's OSes: Workstation. This new ...
Jeremy Sugerman - One of the best experts on this subject based on the ideXlab platform.
-
bringing virtualization to the x86 architecture with the original Vmware Workstation
ACM Transactions on Computer Systems, 2012Co-Authors: Edouard Bugnion, Jeremy Sugerman, Scott W Devine, Mendel Rosenblum, Edward Y WangAbstract:This article describes the historical context, technical challenges, and main implementation techniques used by Vmware Workstation to bring virtualization to the x86 architecture in 1999. Although virtual machine monitors (VMMs) had been around for decades, they were traditionally designed as part of monolithic, single-vendor architectures with explicit support for virtualization. In contrast, the x86 architecture lacked virtualization support, and the industry around it had disaggregated into an ecosystem, with different vendors controlling the computers, CPUs, peripherals, operating systems, and applications, none of them asking for virtualization. We chose to build our solution independently of these vendors. As a result, Vmware Workstation had to deal with new challenges associated with (i) the lack of virtualization support in the x86 architecture, (ii) the daunting complexity of the architecture itself, (iii) the need to support a broad combination of peripherals, and (iv) the need to offer a simple user experience within existing environments. These new challenges led us to a novel combination of well-known virtualization techniques, techniques from other domains, and new techniques. Vmware Workstation combined a hosted architecture with a VMM. The hosted architecture enabled a simple user experience and offered broad hardware compatibility. Rather than exposing I/O diversity to the virtual machines, Vmware Workstation also relied on software emulation of I/O devices. The VMM combined a trap-and-emulate direct execution engine with a system-level dynamic binary translator to efficiently virtualize the x86 architecture and support most commodity operating systems. By relying on x86 hardware segmentation as a protection mechanism, the binary translator could execute translated code at near hardware speeds. The binary translator also relied on partial evaluation and adaptive retranslation to reduce the overall overheads of virtualization. Written with the benefit of hindsight, this article shares the key lessons we learned from building the original system and from its later evolution.
-
gpu virtualization on Vmware s hosted i o architecture
WIOV'08 Proceedings of the First conference on I O virtualization, 2008Co-Authors: Micah Dowty, Jeremy SugermanAbstract:Modern graphics co-processors (GPUs) can produce high fidelity images several orders of magnitude faster than general purpose CPUs, and this performance expectation is rapidly becoming ubiquitous in personal computers. Despite this, GPU virtualization is a nascent field of research. This paper introduces a taxonomy of strategies for GPU virtualization and describes in detail the specific GPU virtualization architecture developed for Vmware's hosted products (Vmware Workstation and Vmware Fusion). We analyze the performance of our GPU virtualization with a combination of applications and micro bench-marks. We also compare against software rendering, the GPU virtualization in Parallels Desktop 3.0, and the native GPU. We find that taking advantage of hardware acceleration significantly closes the gap between pure emulation and native, but that different implementations and host graphics stacks show distinct variation. The micro bench-marks show that our architecture amplifies the overheads in the traditional graphics API bottlenecks: draw calls, downloading buffers, and batch sizes. Our virtual GPU architecture runs modern graphics-intensive games and applications at interactive frame rates while preserving virtual machine portability. The applications we tested achieve from 86% to 12% of native rates and 43 to 18 frames per second with Vmware Fusion 2.0.
-
Workshop on I/O Virtualization - GPU virtualization on Vmware's hosted I/O architecture
2008Co-Authors: Micah Dowty, Jeremy SugermanAbstract:Modern graphics co-processors (GPUs) can produce high fidelity images several orders of magnitude faster than general purpose CPUs, and this performance expectation is rapidly becoming ubiquitous in personal computers. Despite this, GPU virtualization is a nascent field of research. This paper introduces a taxonomy of strategies for GPU virtualization and describes in detail the specific GPU virtualization architecture developed for Vmware's hosted products (Vmware Workstation and Vmware Fusion). We analyze the performance of our GPU virtualization with a combination of applications and micro bench-marks. We also compare against software rendering, the GPU virtualization in Parallels Desktop 3.0, and the native GPU. We find that taking advantage of hardware acceleration significantly closes the gap between pure emulation and native, but that different implementations and host graphics stacks show distinct variation. The micro bench-marks show that our architecture amplifies the overheads in the traditional graphics API bottlenecks: draw calls, downloading buffers, and batch sizes. Our virtual GPU architecture runs modern graphics-intensive games and applications at interactive frame rates while preserving virtual machine portability. The applications we tested achieve from 86% to 12% of native rates and 43 to 18 frames per second with Vmware Fusion 2.0.
-
virtualizing i o devices on Vmware Workstation s hosted virtual machine monitor
USENIX Annual Technical Conference, 2001Co-Authors: Jeremy Sugerman, Ganesh Venkitachalam, Benghong LimAbstract:Virtual machines were developed by IBM in the 1960’s to provide concurrent, interactive access to a mainframe computer. Each virtual machine is a replica of the underlying physical machine and users are given the illusion of running directly on the physical machine. Virtual machines also provide benefits like isolation and resource sharing, and the ability to run multiple flavors and configurations of operating systems. VmwareWorkstation brings such mainframe-class virtual machine technology to PC-based desktop and Workstation computers. This paper focuses on Vmware Workstation’s approach to virtualizing I/O devices. PCs have a staggering variety of hardware, and are usually pre-installed with an operating system. Instead of replacing the pre-installed OS, Vmware Workstation uses it to host a user-level application (VMApp) component, as well as to schedule a privileged virtual machine monitor (VMM) component. The VMM directly provides high-performance CPU virtualization while the VMApp uses the host OS to virtualize I/O devices and shield the VMM from the variety of devices. A crucial question is whether virtualizing devices via such a hosted architecture can meet the performance required of high throughput, low latency devices. To this end, this paper studies the virtualization and performance of an Ethernet adapter on Vmware Workstation. Results indicate that with optimizations, Vmware Workstation’s hosted virtualization architecture can match native I/O throughput on standard PCs. Although a straightforward hosted implementation is CPU-limited due to virtualization overhead on a 733 MHz Pentium R III system on a 100 Mb/s Ethernet, a series of optimizations targeted at reducing CPU utilization allows the system to match native network throughput. Further optimizations are discussed both within and outside a hosted architecture.
-
USENIX Annual Technical Conference, General Track - Virtualizing I/O Devices on Vmware Workstation's Hosted Virtual Machine Monitor
2001Co-Authors: Jeremy Sugerman, Ganesh VenkitachalamAbstract:Virtual machines were developed by IBM in the 1960’s to provide concurrent, interactive access to a mainframe computer. Each virtual machine is a replica of the underlying physical machine and users are given the illusion of running directly on the physical machine. Virtual machines also provide benefits like isolation and resource sharing, and the ability to run multiple flavors and configurations of operating systems. VmwareWorkstation brings such mainframe-class virtual machine technology to PC-based desktop and Workstation computers. This paper focuses on Vmware Workstation’s approach to virtualizing I/O devices. PCs have a staggering variety of hardware, and are usually pre-installed with an operating system. Instead of replacing the pre-installed OS, Vmware Workstation uses it to host a user-level application (VMApp) component, as well as to schedule a privileged virtual machine monitor (VMM) component. The VMM directly provides high-performance CPU virtualization while the VMApp uses the host OS to virtualize I/O devices and shield the VMM from the variety of devices. A crucial question is whether virtualizing devices via such a hosted architecture can meet the performance required of high throughput, low latency devices. To this end, this paper studies the virtualization and performance of an Ethernet adapter on Vmware Workstation. Results indicate that with optimizations, Vmware Workstation’s hosted virtualization architecture can match native I/O throughput on standard PCs. Although a straightforward hosted implementation is CPU-limited due to virtualization overhead on a 733 MHz Pentium R III system on a 100 Mb/s Ethernet, a series of optimizations targeted at reducing CPU utilization allows the system to match native network throughput. Further optimizations are discussed both within and outside a hosted architecture.
Kenneth Van Surksum - One of the best experts on this subject based on the ideXlab platform.
-
Release: Vmware Workstation 11 and Vmware Player 7 Pro
2014Co-Authors: Kenneth Van SurksumAbstract:On October 1st Vmware announced the upcoming features for Workstation version 11 and Player Pro version 7. Today Vmware released both version making them generally ...
-
Release: Vmware Workstation 8.0.1/Player 4.0.1
2011Co-Authors: Kenneth Van SurksumAbstract:In September Vmware released a new major version of its virtualization platform Workstation 8.0 and in October it released Player 4.0. Now Vmware released an ...
Tim Ebringer - One of the best experts on this subject based on the ideXlab platform.
-
MALWARE - An automatic anti-anti-Vmware technique applicable for multi-stage packed malware
2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008Co-Authors: Tim Ebringer, S. BoztagAbstract:The Vmware Workstation virtualisation software is widely used by antivirus researchers for malware analysis. However, a large amount of current generation malware employs various anti-Vmware techniques in order to resist analysis. To make things worse, these anti-Vmware techniques are applied not only in the payload itself, but also in the runtime packer that is used to disguise the malicious code. Fortunately, at the present time, there is not a wide variety of anti-Vmware methods in use, so the assembly code which describes the operation is quite characteristic. The issue therefore becomes exactly at what stage of the execution should one look for such code, since the actual anti-Vmware code is normally heavily obfuscated. Sometimes it may only be decrypted shortly before it is executed. This paper shows that judicious automated control of a debugger can successfully be used to slither around anti-Vmware detections even in sophisticated packers, such as Themida.
-
An automatic anti-anti-Vmware technique applicable for multi-stage packed malware
2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008Co-Authors: Li Sun, Tim Ebringer, Serdar BoztasAbstract:The Vmware Workstation virtualisation software is widely used by antivirus researchers for malware analysis. However, a large amount of current generation malware employs various anti-Vmware techniques in order to resist analysis. To make things worse, these anti-Vmware techniques are applied not only in the payload itself, but also in the runtime packer that is used to disguise the malicious code. Fortunately, at the present time, there is not a wide variety of anti-Vmware methods in use, so the assembly code which describes the operation is quite characteristic. The issue therefore becomes exactly at what stage of the execution should one look for such code, since the actual anti-Vmware code is normally heavily obfuscated. Sometimes it may only be decrypted shortly before it is executed. This paper shows that judicious automated control of a debugger can successfully be used to slither around anti-Vmware detections even in sophisticated packers, such as Themida.