The system also virtualizes the graphical user interface, enabling applications in different AppVMs to share the same desktop, according to the project website. "We have designed the GUI virtualization subsystem with two primary goals: security and performance. Our GUI infrastructure introduces only about 2,500 lines of C code (LOC) into the privileged domain (Dom0), which is very little, and thus leaves not much space for bugs and potential attacks," noted the project website. "At the same time, due to smart use of Xen shared memory our GUI implementation is very efficient, so most virtualized applications really feel as if they were executed natively."
The link for this article located at infosecurity is no longer available.