Results 161 to 170 of about 13,965 (202)
Some of the next articles are maybe not open access.
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot
2020Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22].
Zaidenberg, Nezer Jacob +6 more
openaire +3 more sources
2010 43rd Hawaii International Conference on System Sciences, 2010
This paper discusses the implementation of a new hypervisor mechanism for loading dynamic shared objects (modules) at runtime. These loadable hypervisor modules (LHM) are modeled after the loadable kernel modules used in Linux. We detail the current LHM implementation based on the Xen hypervisor.
Thomas Naughton +3 more
openaire +1 more source
This paper discusses the implementation of a new hypervisor mechanism for loading dynamic shared objects (modules) at runtime. These loadable hypervisor modules (LHM) are modeled after the loadable kernel modules used in Linux. We detail the current LHM implementation based on the Xen hypervisor.
Thomas Naughton +3 more
openaire +1 more source
Proceedings of the 47th Design Automation Conference, 2010
This paper explores the opportunities and challenges in using virtualization technologies in embedded devices. The uses and requirements that have shaped the current generation of Hypervisors for data centers and server farms are introduced. The paper then explores how Multicore processors and Hypervisors can be used to design embedded devices with ...
openaire +1 more source
This paper explores the opportunities and challenges in using virtualization technologies in embedded devices. The uses and requirements that have shaped the current generation of Hypervisors for data centers and server farms are introduced. The paper then explores how Multicore processors and Hypervisors can be used to design embedded devices with ...
openaire +1 more source
Taxonomy of Real-Time Hypervisors
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013Virtualization technology has been a key driver for cloud computing, and is also being widely applied to server environments. The technology provides a software based separation of logic within a system. This allows server consolidation, i.e. running several operating systems in parallel on a single hardware platform.
Franssens, Nills +2 more
openaire +2 more sources
New Electronics, 2020
Why using a hypervisor improves the security and reliability of an untrusted system
openaire +1 more source
Why using a hypervisor improves the security and reliability of an untrusted system
openaire +1 more source
29th Digital Avionics Systems Conference, 2010
We have developed an early prototype of an ARINC 653 implementation using the virtualization technology of the open source Xen hypervisor along with a Linux-based domain/partition OS. In this paper we share lessons learned from adding to our prototype both an ARINC 653 CPU scheduler and a simple ARINC 653 serial I/O driver. By using a common hypervisor
openaire +1 more source
We have developed an early prototype of an ARINC 653 implementation using the virtualization technology of the open source Xen hypervisor along with a Linux-based domain/partition OS. In this paper we share lessons learned from adding to our prototype both an ARINC 653 CPU scheduler and a simple ARINC 653 serial I/O driver. By using a common hypervisor
openaire +1 more source
2016
We describe how to build a Language-Based Hypervisor (LBH) that can run untrusted applications (or modules) inside secure containers within a single language runtime instance. The LBH allows execution of untrusted code at a fine-grained level while controlling access to APIs, data, and resources.
Enrico Budianto +3 more
openaire +1 more source
We describe how to build a Language-Based Hypervisor (LBH) that can run untrusted applications (or modules) inside secure containers within a single language runtime instance. The LBH allows execution of untrusted code at a fine-grained level while controlling access to APIs, data, and resources.
Enrico Budianto +3 more
openaire +1 more source
Assessment of Hypervisor Vulnerabilities
2016 International Conference on Cloud Computing Research and Innovations (ICCCRI), 2016Hypervisors are the main components for managing virtual machines on cloud computing systems. Thus, the security of hypervisors is very crucial as the whole system could be compromised when just one vulnerability is exploited. In this paper, we assess the vulnerabilities of widely used hypervisors including VMware ESXi, Citrix XenServer and KVM using ...
Ammarit Thongthua +1 more
openaire +1 more source
Hypervisor-based background encryption
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2012To prevent data breaches, many organizations deploy full disk encryption to their computers. While OS-based encryption is widely accepted in practical situations, hypervisor-based encryption offers significant advantages such as OS independence and providing more secure environments.
Yushi Omote +5 more
openaire +1 more source
Reconfigurable Computing Hypervisors
Increasing complexity in automation and autonomy features in aircraft, particularly with the introduction of Machine Learning (ML) based approaches is leading to a growing interest in highly parallel processing architectures, Graphical Processing Units (GPUs). However, GPUs come with challenges, such as certification, weight and thermal design. AnotherJanson, Vincent +3 more
openaire +1 more source

