¼¼ºÎÇÁ·Î±×·¥

 

[B3] XenARM and Virtualization Technology for Consumer Electronics
ÄÚµå¹øÈ£ : 2
¹ßÇ¥ÀÚ : ¼­»ó¹ü
¼Ò¼Ó : »ï¼ºÁ¾ÇÕ±â¼ú¿ø
ºÎ¼­ :
Á÷À§ : ¹Ú»ç
¼¼¼Ç½Ã°£ :
¹ßÇ¥ÀÚ¾à·Â :
1. B.Sc. in Electronic Engineering in Inha University, Korea 1986.
2. M.E. in Engineering in Yonsei University, Korea 1988.
3. Ph.D. in Computer Science in University of Cambridge, UK 2006.


1. 1986 ~ 1990: Engineer in R&D center, Daewoo Electronics, Korea
Developed a teletext decoder for the first Korean Teletext-Television Broadcast
trial service.
2. 1990 ~ 1998: Senior SW engineer in R&D center, Daewoo Telecom, Korea.
Developed a set-top box for the first Korean MPEG-2 cable TV trial service and PC
3. 2003.11 ~ present: Principal engineer in SW Research Center, SAIT, Samsung
Electronics, Korea
R&D on HW system/OS virtualization and multicore SW
R&D on cross-layer QoS control for wireless transmission of HD video
°­¿¬¿ä¾à : System virtualization technology has studied extensively for servers of which computing bandwidth is sufficie
ntly large enough to cover the virtualization overheads. This technology helps users consolidate the hardwar
e, and provides flexibility. Among system virtualization techniques, however, a para-virtualization technique
that needs modification of guest operating systems (OS) running on system virtualization software called virt
ual machine monitor (VMM) enables us to reduce the computing overheads.
As for embedded systems, owing to the advance in wireless connectivity technologies, they will be equipped
with Bluetooth, Wi-Fi as well as GSM or CDMA. Furthermore, increased computing power of mobile phones all
ows users to use various services such as internet banking in the similar way that PC users do. Thus, they wil
l face problems with malware shown in PC environments. We think that this issue can be handled by secure s
ystem virtualization that combines system virtualization with access control. This provides separation of gues
t OS on VMM, so that any compromised guest OS can be effectively quarantined and would guarantee availa
bility of important services for mobile phones. So, we have designed a secure VMM architecture on a commer
cial smart phone hardware platform using ARM CPU, where Xen is used as reference VMM architecture.
In this talk, the speaker will present applications of virtualization like security and state migration and architec
ture of Samsung¡¯s secure Xen and show demo video of the prototype.

-. CE Virtualization
-. Virtualization based Access Control
-. State Migration of Computing Environments
.
¸ñ·Ïº¸±â