Results 171 to 180 of about 13,965 (202)
Some of the next articles are maybe not open access.
2019
This chapter showcases several micro-hypervisor-based applications (“uberapps”) that employ uberXMHF. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path, and on-demand I/O ...
openaire +1 more source
This chapter showcases several micro-hypervisor-based applications (“uberapps”) that employ uberXMHF. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path, and on-demand I/O ...
openaire +1 more source
Hypervisors for Consumer Electronics
2009 6th IEEE Consumer Communications and Networking Conference, 2009Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. This paper examines a number of typical virtualization use cases from the CE domain, and
openaire +1 more source
CrashOS: Hypervisor Testing Tool
2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2017Hypervisors are software more and more widespread because of the increasing usage of virtualization, especially in the Cloud. But they are not bug-free. CrashOS is developed to test them and contributes to find security vulnerabilities in hypervisors.
openaire +1 more source
2014
Once the use case and requirements for your virtualized system environment have been specified (Chapter 2), you have to design the networking scheme, implement the storage configuration, and install and configure the Linux operating system.
openaire +1 more source
Once the use case and requirements for your virtualized system environment have been specified (Chapter 2), you have to design the networking scheme, implement the storage configuration, and install and configure the Linux operating system.
openaire +1 more source
2019
In this chapter we will discuss what micro-hypervisors are and why they are important. We will present a discussion on competing system architectures and delineate the capabilities and importance of micro-hypervisors.
openaire +1 more source
In this chapter we will discuss what micro-hypervisors are and why they are important. We will present a discussion on competing system architectures and delineate the capabilities and importance of micro-hypervisors.
openaire +1 more source
Rust-Shyper: A reliable embedded hypervisor supporting VM migration and hypervisor live-update
Journal of Systems Architecture, 2023Bo Jiang
exaly
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation
IEEE Transactions on Dependable and Secure Computing, 2023Kunli Lin, Kun Zhang, Bibo Tu
exaly
Enabling SDN Hypervisor Provisioning Through Accurate CPU Utilization Prediction
IEEE Transactions on Network and Service Management, 2021Nemanja Deric +2 more
exaly
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
Computers and Security, 2020Abdulaziz Aldribi, Issa Traore
exaly

