[Openembedded-architecture] Intel hosts OpenXT Summit on Xen and OpenEmbedded Client Virtualization, June 7-8 in Fairfax, VA, USA
Rich Persaud
persaur at gmail.com
Fri May 27 18:48:15 UTC 2016
I'm a contributor to OpenXT, which uses an OE-derived, security-oriented distro within Xen virtual machines that are tested on desktop hardware, while users interact with Windows or Debian/Ubuntu graphical desktop VMs that see only "virtual hardware".
The next release of OpenXT will be based on Yocto Project 2.0 (jethro). We're having an event soon, more information below. Questions about OpenXT are welcome, we hope to contribute more to meta-virtualization and other OE layers in coming months.
Rich
---
While the Xen Project is well known for servers and hosted infrastructure, Type-1 hypervisors have been used in client endpoints and network appliances, improving security and remote manageability. Virtualization-based security in Qubes and Windows 10 is also educating system administrators about hardware security (IOMMU and TPM) and application trust models.
Released as open-source software in 2014, OpenXT is a development toolkit for hardware-assisted security research and appliance integration. It includes hardened Linux VMs that can be configured as a user-facing software appliance for client devices, with virtualization of storage, network, input, sound, display and USB devices. Hardware targets include laptops, desktops and workstations.
OpenXT stands on the shoulders of the Xen Project, OpenEmbedded Linux and Citrix XenClient XT. It is optimized for hardware-assisted virtualization with an IOMMU and a TPM. It configures Xen network driver domains, Linux stub domains, Xen Security Modules, GPU passthrough, Intel TXT, SE Linux, and VPNs. Guest operating systems include Windows, Linux and FreeBSD. VM storage options include encrypted VHD files with boot-time measurement and non-persistence.
OpenXT enables loose coupling of open-source and proprietary software components, verifiable measurements of hardware and software, and verified launch of derivative products. It has been used to develop locally/centrally managed software appliances that isolate high-risk workloads, networks and devices.
The inaugural OpenXT Summit brings together developers and ecosystem participants for a 2-day conference in Fairfax, VA, USA on June 7-8, 2016. The audience for this event includes kernel and application developers, hardware designers, system integrators and security architects.
There is no cost to attend, but registration is required. For more information, please see the event website at http://openxt.org/summit. For presentations and papers related to OpenXT, please see http://openxt.org/history.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openembedded.org/pipermail/openembedded-architecture/attachments/20160527/7d73f9b4/attachment-0002.html>
More information about the Openembedded-architecture
mailing list