The Study and Evaluation of ARM-Based Mobile Virtualization
نویسندگان
چکیده
In common sense, virtualization technology is adopted to offer several isolated execution environments and make better use of computational resources in server environment. However, in embedded systems, the significance of virtualization does not come into the picture. The extensive utilization of mobile smart devices has led to a series of issues such as security, wasting of resources, and power consumption. In this paper, we discuss how mobile virtualization addresses these challenges and then present a detail analysis of four mainstream mobile virtualization solutions: containers, paravirtualization, hardware-assisted full virtualization, and microkernel. At last, we carry out a series of performance comparisons among these solutions and make some suggestions for further research.
منابع مشابه
Research on System Virtualization using Xen Hypervisor for ARM based secure mobile phones
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger, its security is becoming an important issues. Xen as a virtualization technology could be one of its solutions with domain protection mechanism. Recently, Xen community released the interesting patch that supports mobile devices based on ARM architecture. This seminar paper deals with this patc...
متن کاملKVM/ARM: Experiences Building the Linux ARM Hypervisor
As ARM CPUs become increasingly common in mobile devices and servers, there is a growing demand for providing the benefits of virtualization for ARMbased devices. We present our experiences building the Linux ARM hypervisor, KVM/ARM, the first full system ARM virtualization solution that can run unmodified guest operating systems on ARM multicore hardware. KVM/ARM introduces split-mode virtuali...
متن کاملOn Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems
Virtualization has become one of the most important security enhancing techniques for embedded systems during the last years, both for mobile devices and cyber-physical system (CPS). One of the major security threats in this context is posed by side channel attacks. In this work, Bernstein’s time-driven cache-based attack against AES is revisited in a virtualization scenario based on an actual ...
متن کاملDesign and Evaluation of a Mobile-Based Application for Patients With Type 2 Diabetes: Case Study of Shariati Hospital in Tehran, Iran
Background: With regard to the particularly high prevalence, cost, and number of disabilities associated with diabetes, increasing patients’ knowledge and skills for managing the disease can help minimize the risks of complications. Objective: The present study aimed to design and evaluate a mobile-based application with which patients with type 2 diabete...
متن کاملDesign, Implementation and Evaluation of Azmer Online Quiz Application Based on Technology Acceptance Model (TAM): A pilot study
Introduction: Acceptance and intention to use the mobile device in the student evaluation is an interesting topic in education. Although there are significant studies of mobile learning acceptance and mobile-based assessment (MBA), there is little research on app design and driving factors that influence students' intention to use mobile technology for assessment purposes. The purpose of this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJDSN
دوره 11 شماره
صفحات -
تاریخ انتشار 2015