Results 91 to 100 of about 78,918 (241)
Glider: A GPU Library Driver for Improved System Security [PDF]
Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks.
Sani, Ardalan Amiri +2 more
core
CamFlow: Managed Data-sharing for Cloud Services
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean +3 more
core +2 more sources
Faster Positional‐Population Counts for AVX2, AVX‐512, and ASIMD
ABSTRACT The positional population count operation pospopcnt counts for an array of w$$ w $$‐bit words how often each of the w$$ w $$ bits was set. Various applications in bioinformatics, database engineering, and digital processing exist. Building on earlier work by Klarqvist et al., we show how positional population counts can be rapidly computed ...
Robert Clausecker +2 more
wiley +1 more source
Hierarchical Token Bucket (HTB) adalah metode yang digunakan untuk mengatur bandwidth pada jaringan dengan mengatur packet yang dikirimkan pada jaringan.
Sukmajati Prayoga
doaj
Deductive Verification of Unmodified Linux Kernel Library Functions
This paper presents results from the development and evaluation of a deductive verification benchmark consisting of 26 unmodified Linux kernel library functions implementing conventional memory and string operations.
B Jacobs +6 more
core +1 more source
Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core +1 more source
Methods and tools for automated static verification aim at detecting all violations of checked requirements in target programs under certain assumptions even without complete models and formal specifications.
I. S. Zakharov, E. M. Novikov
doaj +1 more source
A Generic Checkpoint-Restart Mechanism for Virtual Machines [PDF]
It is common today to deploy complex software inside a virtual machine (VM). Snapshots provide rapid deployment, migration between hosts, dependability (fault tolerance), and security (insulating a guest VM from the host).
Cooperman, Gene +2 more
core
Operating System’s Kernel Hooking Methods (Study Case of Linux Kernel)
The article presents an overview of dynamic integration in the kernel Linux, allowed to modify (add, change) its functionality. Traditional methods of integration based on changing in the kernel code (patching), and methods based on using system ...
Ilya Vladimirovich Matveychikov
doaj
It is challenging to achieve a consistent real-time (RT) response time in commodity virtual machine (VM) environments because they have longer and more complex network protocol stacks.
Oscar F. Garcia +2 more
doaj +1 more source

