Over the last year Xen has received a lot of work and attention on its VMI capabilities. Starting with Xen 4.6, VMI is going to be natively supported on both Intel and ARM chips, bringing forth an unparalleled API on which users can build monitoring and security applications. In this talk we will take a look at the current state of affairs and look ahead to what features are coming. We will discuss the hardware issues and security vulnerabilities that were discovered over the last year as a result of the active development of new VMI features. We'll explore lessons learnt during the development process of the new and revamped VMI subsystem and discuss practical tools and methods that have been built to aid the process of developing new cross-platform Xen features. Finally, recommendations will be put forth to improve the experience of new developers contributing to Xen.
Security Researcher at Technische Universitat Muenchen, PhD Student at the University of Connecticut. Invited talks at CCC, ACSAC, TROOPERS15, Hacktivity.
Monday August 17, 2015 2:50pm - 3:20pm PDT
Ravenna CSheraton Seattle, 1400 6th Ave., Seattle, WA 98101