Monthly Archives: December 2008

VTDS’09: EuroSys Workshop on Virtualization Technology for Dependable Systems

VTDS’09: EuroSys Workshop on Virtualization Technology for Dependable Systems

Co-located with EuroSys 2009, Nuremberg, Germany Tuesday, 31st March, 2009

Important dates:
* Submission of contributions: Jan. 19, 2009
* Notification of acceptance: Feb. 16, 2009
* Camera-ready contributions: Mar. 2, 2009
* Workshop: Mar. 31, 2009

Virtualization has a long tradition in computer systems research and has experienced a strong revival during the last years. This workshop is intended to be a forum for the exchange of ideas and experiences on the use of virtualization technologies (VT) for constructing dependable systems. The workshop will be specially interested in highly available, resilient, and intrusion-tolerant systems. It will center around questions such as: How to build such systems using virtualization? Can virtualization help to increase dependability? What are the risks of using virtualization? How to analyze and verify VT-based dependable systems? The workshop aims to bring together researchers in these areas to present recent results, the steps needed for deploying VT-based dependable systems in practice, discuss open problems that still need research, and target application domains for VT-based dependability.

The topics of the workshop focus on system aspects at the local operating system level (resilience of VT, formal verification of hypervisors and OS) as well as distributed system aspects (VT-based replication, intrusion tolerance). In particular, the VTDS workshop topics include:

* Virtualization-based mechanism for tolerating faults
and intrusions
* Security aspects of using virtualization in distributed
* Resilience of virtualization technology
* Implementing a trusted computing base with virtualization
* Modelling the resilience of virtualization-based
dependable systems
* Formal verification of hypervisors and operating systems
* Adaptivity in VT-based dependable systems

Submission instructions:

Manuscripts must be submitted as printable PDF documents and should not exceed 3000 words. Formatting according to the final manuscript style (ACM standard) is recommended. Electronic submission will be available starting in January on the workshop website.
The camera-ready version of manuscripts must be formatted according to the ACM standard style (2-column), and must not exceed 6 pages. EuroSys plans publish the accepted papers in the ACM Digital Library, International Conference Proceedings Series (AICPS).

At least one author of an accepted paper must register at the conference and present the paper at the workshop.

Workshop organizers:

* Hans P. Reiser (Primary contact)
Faculdade de Ciencias, Universidade de Lisboaa
* Ruediger Kapitza
Univ. Erlangen-Nuernberg

Program Committee:

* Artur Andrzejak (Zuse Institute Berlin, Germany)
* Miguel Correia (Univ. Lisboa, Portugal)
* Uwe Dannowski (AMD)
* Christof Fetzer (Univ. Dresden, Germany)
* Jacob G. Hansen (VMware)
* Xuxian Jiang (North Carolina State University, US)
* Miroslaw Malek (HU Berlin, Germany)
* Carlos Maziero (PUCPR, Brazil)
* Matthias Schunter (IBM Zurich)
* Jordi Torres (TU Catalonia, Barcelona, Spain)
* Andrew Warfield (University of British Columbia, Canada)

2008 Community Yearly Review

Xen Community:

As I finish my first year as community manager for, I thought I would take a few moments to highlight some of the community’s accomplishments for 2008. If you want more details, I have added a relevant web link or you can contact me directly. I would also like to thank each of you for your commitment to Xen and look forward to an even busier 2009 as we continue to establish Xen as the open source hypervisor of choice; globally!

2008 Highlights…

  1. Xen Product Releases
    1. Xen 3.3 , Xen 3.2.2, Xen 3.2.1,  & Xen 3.1.4
    2. Xen 3.3 Feature Descriptions
  2. Xen Summit
    1. North America (hosted by Citrix)
    2. Asia (hosted by Fujitsu)
  3. Xen Hypervisor Training
    1. USENIX Annual Technical Conference
  4. Website
    1. Layout update including new Google News – “Xen Hypervisor” – on home page
    2. Community Blog – 7 Authors, 203 Posts, 104 Comments, & 258 Tags
    3. Community Profiles – 60 members profiled including start of “Meet a Community Member
    4. Projects Page – 19 projects listed plus Project Document
    5. Case Studies – ATG, Brandeis University, Time Machine, Pivot3
    6. Mailing List Search Tool – Public search of every mailing list using
    7. Xen Bug Tracking
    8. New Mailing Lists – xen-community, xen-japanese, xen-introspect
  5. Xen Trademark Policy
    1. Published Trademark Policy from Xen Advisory Board & Community Review of Trademark Policy
  6. Xen Social Networking
    1. LinkedIn, Facebook. Ohloh, Xing, and Plaxo

2009 is already shaping up to be an exciting year for with several activities already scheduled:

  • Xen Summit North America (Oracle) – Feb 24 – 25, 2009
  • Xen Summit Europe (LinuxTAG) – June, 2009
  • Sponsorship of Next Generation Data Center – August 11 – 12, 2009

Once again, thanks for all your contributions in 2008 and I look forward to working with you in 2009.

Ian Pratt PodCast with Doug Brown

For those of you who want to hear Ian’s latest comments on Xen, etc – Doug Brown of has just posted a PodCast at

From (

n episode 67, Douglas Brown interviews Ian Pratt, Vice President of Advanced Products for Citrix Systems, Inc.   Ian is also the co-founder of XenSource, the company Citrix bought and turned into the XenServer solution, along with the head of development of the Xen open-source hypervisor project.  Needless to say we were very excited to have Ian on the show.   Ian and Douglas discuss Ian’s role at Citrix along with his views on everything from client side hypervisors to virtualization security, to the differences between the Xen hypervisor and Citrix’s XenServer hypervisor.  Douglas and Ian also discuss the following subjects:

  • Who is Ian Pratt
  • Pro and Cons of Virtualization
  • Client side Hypervisors
  • Virtualization Security
  • History of Xen Hypervisor
  • Difference between Xen Hypervisor and Citrix XenServer
  • A bit about the Community
  • Benefits of paravirtualization and enlightenment
  • Memory Overcommitment
  • Plus much more…

Security through Isolation in Xen

Hi all,

Together with some other coworkers we have been working on a reference implementation of the security through isolation concept using virtualization. This project is using Xen to provide a contained virtualized environment where malware can run without affecting the whole system.

The goal for this project is to foster the usage of virtualization technology in client platforms (desktops and notebooks) using security as a usage driver. This reference implementation provides certain capabilities which serve as a starting point for the long term goal; some of them are:

-     To manage paused Sandbox Virtual Machines ready to be awaken instantaneously to execute suspicious applications

-     To destroy and re-open the Sandbox Virtual Machines once the contained suspicious application was closed 

Especially, we think that the module which manages the Ready-to-be-executed Sandbox VMs (VM-Pool at Domain 0) may be suitable for other purposes such as high availability of virtual appliances, short-delay responses for highly loaded services, among others; so we’d like to hear from any suggestion on how to adapt it to meet new needs.

We invite you to try the current version of the project Isolated Execution. You can find the code and the documentation about how to compile and install it at Source Forge: Also, at, you can find a flash description of what the “early-product” does. 

We’d appreciate to receive feedback from the community about the overall concept, and whether you’d like to go deep on any aspect of it. We invite you to post comments/suggestions at or here. 

Thanks and see you there!


2 New Projects on Community Projects Page

I have added 2 new projects to the community projects page:

  • Eucalyptus Project – (Contact: Rich Wolski)
    • Definition: Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems – is an open-source software infrastructure for implementing “cloud computing” on clusters.
    • Links: Project Home Page
  • Project – (Contact: Ruben Santiago Montero)
    • Definition:OpenNebula is an open source virtual infrastructure engine that enables the dynamic deployment and re-placement of virtual machines on a pool of physical resources.
    • Links: Project Home Page