面向新一代移动计算平台的系统虚拟化研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着PC市场的逐渐饱和,“后PC”时代正在到来。上网本,智能手机,平板电脑,音乐播放器,掌上游戏机等各种新型便携式移动设备不断涌现,成为新一代移动计算平台。其中智能手机和平板电脑的发展更是十分迅速,不仅用户数量巨大,而且硬件功能日益强大,软件应用层出不穷,已经成为人们日常生活中不可或缺的一部分。
     然而,随着各种移动设备的快速发展,它们也面临着诸多的问题和挑战。例如,软硬件功能的不断增加导致了整个系统越来越复杂,也越来越不稳定。各种针对手机等设备的病毒,木马,恶意软件和间谍软件日益增多,威胁人们的隐私和信息安全。强大的功能伴随着对功耗的高需求,而电池技术发展缓慢,制约了更多应用的发展。用户的数据分布在不同的设备上,管理这些设备和数据变得越来越不方便,等等。本文研究了如何通过系统虚拟化技术来解决新一代移动计算平台上
     的关键问题,主要包括以下三个方面的内容。
     一、对系统可靠性和安全性的研究。本文研究了如何利用虚拟机技术来提高移动设备的可靠性和安全性。由于ARM是移动设备上最主要的硬件平台,本文研究了如何对ARM处理器和内存进行虚拟化,特别针对ARM平台设计和实现了一个虚拟机监控器,MobiVMM,能够在同一台物理设备上同时运行多个虚拟机。不同的虚拟机之间完全相互隔离,可以运行不同的操作系统。通过把不同的应用程序运行在不同的虚拟机中,可以大大提高整个系统的可靠性和安全性:即使某个虚拟机的运行出了严重的问题或者受到了攻击,其它的虚拟机仍然可以正常运行。除了研究对ARM体系结构进行虚拟化的基本问题以外,MobiVMM还考虑了移动设备的特点,强调了对系统资源的高效利用,并对实时性提供了一定的支持。MobiVMM是第一个专门为ARM平台从零设计的全新虚拟机监控器,具有代码简洁,使用系统资源少,功耗低,系统响应快等特点。
     二、对设备共享和用户隐私保护的研究。个人移动设备,特别是手机,是非常私人化的设备,往往存储了大量的私人数据,比如通话记录,短信,联系人,照片和视频等。当和其他人共享个人设备时,这些隐私数据必须得到有效的保护。而现有的设备不能对隐私保护提供足够的支持。本文对设备共享问题进行了深入的研究并第一个设计实现了xShare系统来保护设备共享中的用户隐私。xShare通过操作系统层面的虚拟化技术来在设备共享时对用户的隐私数据进行有效的保护。xShare可以在操作系统中动态创建一个虚拟运行环境来用于设备共享。在该虚拟环境下,只有那些被设备主人共享了的数据和应用程序才是可见的,从而保护了那些没有共享的隐私数据。xShare系统实现具有很好的系统性能和易用性,能够满足用户在共享设备时保护用户隐私的实际需要。xShare的研究成果发表在了国际会议MobiSys上,并作为该年5篇最佳论文之一被邀请到IEEE的Transactions on Mobile Computing (TMC)杂志上发表。其扩展版本进一步被选为IEEE TMC杂志当期的焦点文章。
     三、对跨设备用户计算环境的研究。很多用户都在日常生活中使用不同的计算设备。这些设备位于不同的地方,具有不同的操作环境,运行不同的应用程序并且存储不同的数据。用户需要花费大量的时间和精力来管理这些设备和它们上面的数据。为了解决这一问题,本文研究了如何通过应用程序虚拟化技术来创建一个跨设备的用户计算环境,从而用户可以在不同的设备上使用同样的应用程序和访问同样的数据。本文进而设计并实现了DevicePort系统,能够把用户已经安装使用的应用程序和底层的操作系统系统分离开来,可以在不同的设备之间对这些应用程序进行迁移。DevicePort能够迁移包括微软办公套件在内的大多数日常使用的应用程序并以它们原有的性能运行这些应用程序。和基于虚拟机的方法相比,DevicePort具有更小的应用程序启动延迟和更少的处理器开销,而且更容易部署使用。
     这三个方面的研究分别涵盖了三个不同层面的系统虚拟化技术:硬件级别的虚拟化,操作系统级别的虚拟化,以及应用程序级别的虚拟化。围绕着新一代移动计算平台中的实际问题,本文都设计实现了实际可用的系统,并进行了全面详尽的评测。通过这些研究和创新,本文为解决新一代移动计算平台中的更多问题提供了新的思路和参考。
With the saturation of the PC market, the era of“Post PC”is coming. Various mobile devices, such as netbooks, smartphones, tablet PCs, music players and portable game consoles, are increasingly popular and have become the new generation platform for mobile computing. In particular, the advances of smartphone and tablet PC are phenomenal: they have a huge number of users, very powerful hardware and rich applications, and play a significant role in people’s daily life.
     However, these new mobile devices are also facing many problems and challenges. For example, with more hardware components and applications are integrated together, the whole system becomes increasingly complicated and unrealiable. More and more viruses, Trojans horses, malware and spyware are targeting at smartphones and tablet PCs, imposing threats on user privacy and information security. Powerful funcationalities require high power consumption but battery technologies advance slowly, which limits many applications. User data are distributed on different devices, making it hard for users to manage their devices and data, etc.
     This paper studies how to leverage system virtualization technologies to solve the key problems on the new generation mobile computing platform, including the following three main parts.
     1. System reliabity and security. This paper studied how to leverage virtual machine techniques to improve the reliability and security of mobile devices. As ARM is the most popular architecture for mobile devices, this paper studied how to do virtualization for ARM CPU and memory, and designed and implemented a virtual machine monitor for ARM platform, called MobiVMM, to simultanesouly run multiple virtual machines on a single physical ARM device. Different virtual machines are strongly isolated and can run different operating systems. By running different applications in different virtual machines, the realiabilty and security of the whole system can be significantly improved: even if a virtual machine crashes or is attacked, other virtual machines can still run smoothly. Besides studying how to virtualize ARM architecture, MobiVMM is specially designed for mobile devices. It emphases efficient utilization on various system resources and provides support for real-time. MobiVMM is the first VMM designed for ARM architecture from scratch. It has small code base, high power efficiency and fast system response time.
     2. User privacy protection in device sharing. Mobile devices, particularly mobile phones, are truely personal devices and often store various personal data, such as call history, text messages, contacts, photos and videos. When sharing a mobile device with other people, these private data must be protected. Yet existing mobile devices cannot provide sufficient support in privacy protection. This paper deeply studied the user behaviors in device sharing and designed and implemented the first solution, called xShare, to protect user privacy in device sharing. xShare leverages operating system level virtualization to protect user privacy in device sharing. It can dynamically create a virtual running environment inside the operating system for device sharing. In the virtual running environment, only those data and applications which are explicitly shared by the device owner are visible. Consequently, the unshared private data are effectively protected. The system implementation of xShare has good performance, is easy to use, and can meet the real needs for users to protect their privacy in device sharing. xShare was published in Mobisys and invited to IEEE Transactions on Mobile Computing (TMC) as one of the five best papers. The extended version was further selected as the spotlight paper of the issue of IEEE TMC.
     3. Portable user computing environment. Many users use multiple computing devices in their daily life. Those devices locate in different places, have different system settings, run different applications, and store different user data. As a result, users have to spend significant time and effort to manage those devices and their data. To solve this problem, this paper studied how to leverage application virtualization to create a portable user computing environment, so that users can use the same applications and access the same data on different devices. This paper further designed and implemented DevicePort system, which is able to decouple the already-in-use applications from the underlying operating system and make them portable across different devices. The system implementation of DevicePort can support a large number of everyday applications and run them in their native speed, and is easy to deploy. Compared with the VM-based solutions, DevicePort has significant performance improvements in terms of both application launch latency and CPU usage, and is much easier to use.
     The above three parts cover system virtualization technologies in there different layers: the hardware level virtualization, the operating system level virtualization, and the application level virtualization. To solve the practical problems on the new generation platform of mobile computing, real systems are designed and implemented and complehensive evaluations are performed. With the above research and innovations, this paper provides new insights and directions for solving more problems on the new generation mobile computing platform.
引文
[1] Survery by the Ministry of Internal Affairs in Japan, 2006.
    [2]“Cell Phones as a Research Platform: Opportunities and Pitfalls”, Mobisys’07 panel, http://www.sigmobile.org/mobisys/2007/panel.html, 2007.
    [3] H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier,“Shield: Vulnerability-driven Network Filters for Preventing Known Vulnerability Exploits”, in ACM Sigcomm, 2004.
    [4] R. P. Goldberg,“Survey of Virtual Machine Research”, IEEE Computer, pp. 34-45, June 1974.
    [5] T. V. Vleck,“The IBM 360/67 and CP/CMS”, 1997. http://www.multicians .org/thvv/360-67.html.
    [6] R. J. Creasy,“The Origin of the VM/370 Time-Sharing System”, IBM Journal of Research and Development, vol. 25, no. 5, pp. 483-490, 1981.
    [7] M. Rosenblum and T. Garfinkel,“Virtual Machine Monitors: Current Technology and Future Trends”, IEEE Computer, vol. 5, 2005.
    [8] P. H. Gum,“System/370 extended architecture: facilities for virtual machines”, IBM Journal of Research and Development, 27(6):530–544, Nov. 1983.
    [9] G. J. Popek and R. P. Goldberg,“Formal requirements for virtualizable third generation architectures”, Communications of the ACM, vol. 17, no. 7, pp. 412–421, 1974.
    [10] M. Gschwind, E. R. Altman, S. Sathaye, P. Ledak, and D. Appenzeller,“Dynamic and Transparent Binary Translation”, IEEE Computer, vol. 33, issue 3, 2000.
    [11] VMware ESX Server, http://www.vmware.com/products/vi/esx.
    [12] Microsoft Virtual PC, http://www.microsoft.com/windows/products/winfamily/virtualpc /default.mspx.
    [13] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield,“Xen and the art of virtualization,”in Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), October 2003.
    [14] L. P. Cos and P. M. Chen,“Pocket Hypervisor: Opportunities and Challenges”, in HotMobile, 2007.
    [15] D. R. Ferstay,“Fast secure virtualization for the arm platform”, Master’s thesis, Department of Computer Science, University of British Columbia, March 2006.
    [16] J. Hwang, S. Suh, S. Heo, C. Park, J. Ryu, S. Park, C. Kim,“Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones”, in Proceedings of the 5th Annual IEEE Consumer Communications & Networking Conference, USA, January 2008.
    [17] D. Ongaro, A. Cox, and S. Rixner“Scheduling I/O in Virtual Machine Monitors”, in Proceedings of the Virtual Execution Environment conference, 2008.
    [18] B. Leslie, C. van Schaik, and G. Heiser,“Wombat: a portable user-mode linux for embedded systems”, in Proceedings of the 6th Linux Conf., April 2005.
    [19] C. van Schaik and G. Heiser,“High-performance microkernels and virtualisation on arm and segmented architectures data objects”, in Proceedings of the 1st International Workshop on Microkernels for Embedded Systems, Sydney, Australia, 2007.
    [20] Trango: secured virtualization on ARM. http://www.trango-vp.com.
    [21] VirtualLogix Real-Time Virtualization and VLX, http://www.osware.com.
    [22] A. Bose and K. G. Shin,“On Mobile Viruses Exploiting Messaging and Bluetooth Services”, Second International Conference on Security and Privacy in Communication Networks, USA, 2006.
    [23] Tower Group,“Cyber-criminals target mobile banking”, http://www.vnunet.com/vnunet /news/2173161/ cyber-criminals-targetmobile, 2007.
    [24] ARM Architecture Reference Manual, ARM Limited, 2005.
    [25] R. Kaiser,“Alternatives for Scheduling Virtual Machines in Real-Time Embedded Systems”, 1st workshop on Isolation and Integration in Embedded Systems, UK, 2008.
    [26] G. Heiser,“The Role of Virtualization in Embedded Systems”, 1st workshop on Isolation and Integration in Embedded Systems, UK, 2008.
    [27] J. Brakensiek, A. Droge, M. Botteck, H. Hartig, and A. Lackorzynski,“Virtualization as an Enabler for Security in Mobile Devices”, 1st workshop on Isolation and Integration in Embedded Systems, UK, 2008.
    [28] IBM Corporation,“IBM Systems Virtualization”, Version 2 Release 1 (2005), http://publib. boulder.ibm.com/infocenter/eserver/v1r2/topic/eicay/eicay.pdf.
    [29] M. Kieffer,“Windows Virtualization Architecture”, WinHEC 2005, http://www.microsoft. com/whdc/system/platform/virtual/default.mspx.
    [30] Microsoft Hyper-V, http://www.microsoft.com/windowsserver2008/en/us/hyperv-main. aspx.
    [31] Java Technology, http://www.sun.com/java/.
    [32] Common Language Runtime, http://msdn2.microsoft.com/en-us/library/ddk909ch(vs.71). aspx.
    [33] Microsoft Virtual Server, http://www.microsoft.com/windowsserversystem/virtualserver/ default.aspx.
    [34] VMware Workstation, http://www.vmware.com/products/ws/.
    [35] R. P. Goldberg,“Virtual Machine Systems”, MIT Lincoln Laboratory Report. No. MS-2686, 1969.
    [36] J. S. Robin and C. E. Irvine,“Analysis of the Intel Pentium’s Ability to Support a Secure Virtual Machine Monitor”, USENIX Security, 2000
    [37] R. P. Goldberg,“Architectural Principles for Virtual Computer Systems”, PhD thesis, Harvard University, Cambridge, MA, 1972.
    [38] Intel Corp,“IA-32 Intel Architecture Software Developer’s Manual Volume 2: Instruction Set Reference”, Intel Corp, 2002.
    [39] B. Vasanth, D. Evelyn, B. Sanjeev,“Transparent Dynamic Optimization”, HP Labs Technical Reports, 1999.
    [40] WinPcap, http://www.winpcap.org/.
    [41] L. Baraz et al.,“IA-32 Execution Layer: A Two-Phase Dynamic Translator Designed to Support IA-32 Applications on Itanium-Based Systems”, in Proceedings of 36th Ann. IEEE/ACM Int’l Symp, 2003.
    [42] A. Whitaker, M. Shaw, and S. Gribble,“Scale and Performance in the Denali Isolation Kernel”, USENIX OSDI, 2002.
    [43] Intel Corp,“Intel Virtualization Technology Specification for the IA-32 Architecture”, http://www.intel.com/technology/vt/.
    [44] Intel Corp,“Intel Virtualization Technology Specification for the Intel Itanium Architecture”, http://www.intel.com/technology/vt/.
    [45] S. McDowll and G. Strongin,“Virtualization Technology for AMD Architecture”, WinHEC’05, 2005.
    [46] G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhig,“Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization”, Intel Technology Journal, vol. 10, issue 3, 2006.
    [47] D. Abramson, J. Jackson, S. Muthrasanallur, G. Neiger, G. Regnier, R. Sankaran, I. Schoinas, R. Uhlig, B. Vembu, and J. Wiegert,“Intel Virtualization Technology for Directed I/O”, Intel Technology Journal, vol. 10, issue 3, 2006.
    [48] A. Brush and K. Inkpen, "Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments," in Proc. of Ubiquitous Computing 2007, pp. 109-126, 2007.
    [49] A. L. Chavan and D. Gorney, "The Dilemma of the Shared Mobile Phone---Culture Strain and Product Design in Emerging Economies," ACM Interactions, vol. 15, pp. 34-39, 2008.
    [50] M. Hall, "Create a Windows CE Image That Boots to Kiosk Mode", http://msdn.microsoft.com/en-us/libraryaa446914.aspx.
    [51] R. Hull, B. Kumar, D. Lieuwen, P. Patel-Schneider, A. Sahuguet, S. Varadarajan, and A. Vyas, "Enabling Context-aware and Privacy-Conscious User Data Sharing," in Proc. of IEEE Int. Conf. Mobile Data Management, 2004.
    [52] G. C. Hunt and D. Brubacher, "Detours: Binary Interception of Win32 Functions," in Proc. of Conf. USENIX Windows NT Symposium, Seattle, WA, USA: USENIX Association, 1999.
    [53] S. Jain, F. Shafique, V. Djeric, and A. Goel, "Application-level Isolation and Recovery with Solitude," in Proc. of the 3rd ACM SIGOPS/EuroSys European Conf. on Computer Systems, Glasgow, Scotland UK: ACM, 2008.
    [54] P. H. Kamp and R. N. M. Watson, "Jails: Confining the Omnipotent Root," in Proc. of the 2nd International SANE Conf., 2000.
    [55] A. K. Karlson, A. J. B. Brush, and S. Schechter,“Can I Borrow Your Phone?: Understanding Concerns when Sharing Mobile Phones”, in Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, Boston, USA: ACM, 2009.
    [56] B. Lampson,“Computer Security in the Real World”, in Proc. of Annual Computer Security Applications Conf., 2000.
    [57] Z. Liang, V. N. Venkatakrishnan, and R. Sekar, "Isolated Program Execution: an Application Transparent Approach for Executing Untrusted Programs," in Proc. of 19th Annual Computer Security Applications Conf., 2003.
    [58] B. des Ligneris, "Virtualization of Linux Based Computers: the Linux-VServer Project," in Proc. of 19th International Symposium on High Performance Computing Systems and Applications, pp. 340-346, 2005.
    [59] J. S. Olson, J. Grudin, and EricHorvitz, "A Study of Preferences for Sharing and Privacy," in Proc. of Extended Abstracts on Human Factors in Computing Systems, Portland, OR, USA: ACM, 2005.
    [60] T. Pering, D. H. Nguyen, J. Light, and R. Want, "Face-to-Face Media Sharing Using Wireless Mobile Devices," in Proc. of IEEE Int. Symp. Multimedia, IEEE Computer Society, 2005.
    [61] D. Price and A. Tucker, "Solaris Zones: Operating System Support for Consolidating Commercial Workloads," in Proc. of the 18th USENIX Conf. on System Administration, USENIX Association, 2004.
    [62] S. Soltesz, H. P?tzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, "Container-based Operating System Virtualization: a Scalable, High-Performance Alternative to Hypervisors," ACM SIGOPS Operating Systems Review vol. 41, pp. 275-287, 2007.
    [63] A. Voida, R. E. Grinter, N. Ducheneaut, W. K. Edwards, and M. W. Newman, "Listening in: Practices Surrounding iTunes Music Sharing," in Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, Portland, OR, USA: ACM, 2005.
    [64] A. Voida, R. E. Grinter, N. Ducheneaut, W. K. Edwards, and M. W. Newman, "Listening in: Practices Surrounding iTunes Music Sharing," in Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, Portland, OR, USA: ACM, 2005.
    [65] Likert Scale, http://en.wikipedia.org/wiki/Likert_scale.
    [66] Parents using smartphones to entertain bored kids, http://www.cnn.com/2010/ TECH/04/26/smartphones.kids/index.html?hpt=Mid, CNN Living with Technology, 2010.
    [67] Spb Software House, "Spb Kiosk Engine," http://www.spbsoftwarehouse.com/products/ kioskengine.
    [68] VMware Corporation,“VMware Mobile Virtualization Platform”, http://www.vmware. com/technology/mobile/.
    [69] D. S. Miloji?i?, F. Douglis, Y. Paindaveine, R. Wheeler, and S. Zhou, "Process migration," ACM Comput. Surv., vol. 32, pp. 241-299, 2000.
    [70] J. M. Smith, "A survey of process migration mechanisms," SIGOPS Oper. Syst. Rev., vol. 22, pp. 28-40, 1988.
    [71] S. Osman, D. Subhraveti, G. Su, and J. Nieh, "The Design and Implementation of Zap: a System for Migrating Computing Environements", in OSDI, 2002.
    [72] A. surie, H. A. Lagar-Cavilla, E. de Lara and M. Satyanarayanan,“Low-bandwidth VM Migration via Opportunistic Replay”, in HotMobile 2008.
    [73] R. Caceres, C. Carter, C. Narayanaswami, and M. Raghunath, "Reincarnating PCs with Portable SoulPads", in MobiSys, 2005.
    [74] M. Annamalai, A. Birrell, D. Fetterly, and T. Wobber, "Implementing Portable Desktops: A New Option and Comparisons", Microsoft Research Technical Report, MSR-TR-2006-151, 2006.
    [75] M. Satyanarayanan, M. A. Kozuch, C. J. Helfrich, and D. R. O'Hallaron, "Towards Seamless Mobility on Pervasive Hardware", Pervasive and Mobile Computing, 2005.
    [76] MokaFive, http://www.mokafive.com/.
    [77] chroot, http://en.wikipedia.org/wiki/Chroot.
    [78] R. A. Baratto, S. Potter, G. Su and J. Nieh,“MobiDesk: Mobile Virtual Desktop Computing”, in MobiCom 2004.
    [79] J. Dike, "A User-Mode Port of the Linux kernel", in the 4th Annual Linux Showcase & Conference, 2000.
    [80] U3, http://www.u3.com/.
    [81] ThinApp, http://www.vmware.com/product/thinapp/.
    [82] App-V, http://www.microsoft.com/systemcenter/appv.
    [83] Y. Zhang, X. Wang, and L. Hong, "Portable Desktop Applications Based on P2P Transportation and Virtualization", In LISA, 2008.
    [84] Microsoft Corporation, "Working Remotely with Windows XP", http://www.microsoft.com/ windowsxp/using/mobility/default.mspx.
    [85] RealVNC, http://www.realvnc.com.
    [86] Sun Microsystems, "Sun Ray Overview (White Paper)", http://www.sun.com/sunray/techinfo/ New_SR_WP_12_04.pdf.
    [87] Google Apps, http:// www.google.com/apps/.
    [88] M. Satyanarayanan, "The Evolution of Coda", ACM Transactions on Computer Systems 20 (2) (2002).
    [89] C. Tait, H. Lei, S. Acharya, and H. Chang, "Intelligent File Hoarding for Mobile Computers", in MobiCom, 1995.
    [90] J. R. Douceur, J. Elson, J. Howell, and J. R. Lorch, "Leveraging Legacy Code to Deploy Desktop Applications to the Web", in OSDI, 2008.
    [91] Advanced Packaging Tool, http://www.debian.org/doc/manuals/apt-howto/.
    [92] Object Linking and Embedding, http://en.wikipedia.org/wiki/Object_Linking_and_ Embedding.
    [93] Detours software package, http://research.microsoft.com/en-us/projects/detours/.
    [94] Z. Guo, X. Wang, J. Tang, X. Liu, Z. Xu, M. Wu, M. F. Kaashoek, and Z. Zhang, "R2: An Application-Level Kernel for Record and Replay", in OSDI, 2008.
    [95] COM: Component Object Model Technologies, http://www.microsoft.com/com/default. mspx.
    [96] M. Russinovich, Process Explorer, http://technet.microsoft.com/en-us/sysinternals/ bb896653.aspx.
    [97] P. J. Braam, M. J. Callahan, M. Satyanarayanan and M. Schnieder,“Porting the Coda File System to Windows”, in USENIX ATC, 1999.
    [98] S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn and X. Zhang, "Trustworthy and Personalized Computing on Public Kiosks", in MobiSys, 2008.
    [99] J. Howell, G. C. Hunt, D. Molnar and D. E. Porter,“Living Dangerously: a Survey of software download practices”, Tech report MSR-TR-2010-51, Microsoft Research, May 2010.
    [100] G. H. Kuenning and G.J. Popek,“Automated Hoading for Mobile Computers”, in SOSP 1997.
    [101] Live Mesh, https://www.mesh.com/welcome/default.aspx.
    [102] Groove, http://office.microsoft.com/en-us/groove/default.aspx
    [103] Rsync, http://www.samba.org/rsync/.
    [104] Side-by-side assemblies, http://msdn.microsoft.com/en-us/ library/aa376307(VS.85).aspx.
    [105] Elektra project, http://elektra.g4ii.com/Main_Page.
    [106] Windows Native API, http://undocumented.ntinternals.net.
    [107] The Etherreal Network Analyzer, http://www.ethereal.com/.
    [108] USA National Security Institute,“Department of defense trusted computer system evaluation criteria”, 1985.
    [109] Seehwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo, and Yongguang Zhang, "MobiVMM: a Virtual Machine Monitor for Mobile Phones", MobiVirt workshop, 2008.
    [110] Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae Jang, Lin Zhong, Yongguang Zhang, and Shensheng Zhang, "xShare: Supporting Impromptu Sharing of Mobile Phones," in ACM/USENIX Int. Conf. Mobile Systems, Applications, and Services (MobiSys), June 2009.
    [111] Yunxin Liu, Ahmad Rahmati, Hyukjae Jang, Yuanhe Huang, Lin Zhong, Yongguang Zhang, and Shensheng Zhang, "Design, Realization, and Evaluation of xShare for ImpromptuSharing of Mobile Phones", IEEE Transactions on Mobile Computing, vol. 9, no. 12, pp. 1682-1696, Augest 2010, doi:10.1109/TMC. 2010.162
    [112] Yunxin Liu, Yongqiang Xiong, Mingfei Guo, Yuanhe Huang, and Hyukjae Jang,“zBridge: Enabling a Mobile Workspace in Your Hand”, Mobicom’09 Demo, September 2009.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700