Results 51 to 60 of about 5,262 (215)

Automated testing of a TCG frontend for Qemu

open access: yesProceedings of the Institute for System Programming of the RAS, 2019
Implementing new target architecture in Qemu involves creating a frontend of the TCG dynamic binary translator to this architecture. Testing is necessary to verify the correctness of that translator component. Currently, existing TCG frontend testing systems use an approach based on comparison with an oracle.
D. S. Koltunov   +2 more
openaire   +2 more sources

Using Deterministic Replay for Software Fault Injection

open access: yesТруды Института системного программирования РАН, 2018
This paper presents method of improving software fault injection by using deterministic replay. Fault injection and fuzzing are the methods of testing used for checking code coverage quality, improving error handling, and robustness testing.
P. M. Dovgalyuk, Y. V. Markin
doaj   +1 more source

Successive memory image analysis method for malicious codes

open access: yes网络与信息安全学报, 2017
In order to detect the behavior of malicious code more comprehensively, the technology of continuous memory image analysis was proposed. The core idea was to run malicious code in QEMU virtual machine, to obtain the memory image of the continuous ...
Wei-ming LI, De-qing ZOU, Guo-zhong SUN
doaj   +3 more sources

Application of software emulators for the binary code analysis

open access: yesТруды Института системного программирования РАН, 2018
The article presents the experience of using software emulators as a tool for dynamic analysis of binary code: as a machine instruction tracer, and as a smart interactive debugger.
P. M. Dovgalyuk   +4 more
doaj   +1 more source

A Generic Checkpoint-Restart Mechanism for Virtual Machines [PDF]

open access: yes, 2012
It is common today to deploy complex software inside a virtual machine (VM). Snapshots provide rapid deployment, migration between hosts, dependability (fault tolerance), and security (insulating a guest VM from the host).
Cooperman, Gene   +2 more
core  

Learning Concise Models from Long Execution Traces

open access: yes, 2020
models of system-level behaviour have applications in design exploration, analysis, testing and verification. We describe a new algorithm for automatically extracting useful models, as automata, from execution traces of a HW/SW system driven by software ...
Jeppu, Natasha Yogananda   +3 more
core   +1 more source

Enhancing Security and Performance in Live VM Migration: A Machine Learning‐Driven Framework With Selective Encryption for Enhanced Security and Performance in Cloud Computing Environments

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Live virtual machine (LVM) migration is pivotal in cloud computing for its ability to seamlessly transfer virtual machines (VMs) between physical hosts, optimise resource utilisation, and enable uninterrupted service. However, concerns persist regarding safeguarding sensitive data during migration, particularly in critical sectors like ...
Raseena M. Haris   +4 more
wiley   +1 more source

Developing a Debugger for Real-Time Operating System

open access: yesТруды Института системного программирования РАН, 2018
In this paper, we report on the work in progress on the debugger project for real-time operating system JetOS for civil airborne systems. It is designed to work within Integrated Modular Avionics (IMA) architecture and implements ARINC 653 API ...
A. N. Emelenko   +2 more
doaj   +1 more source

Adding Real-time Capabilities to a SML Compiler

open access: yes, 2016
There has been much recent interest in adopting functional and reactive programming for use in real-time system design. Moving toward a more declarative methodology for developing real-time systems purports to improve the fidelity of software.
Li, Muyuan   +4 more
core   +1 more source

First steps towards the certification of an ARM simulator using Compcert [PDF]

open access: yes, 2011
The simulation of Systems-on-Chip (SoC) is nowadays a hot topic because, beyond providing many debugging facilities, it allows the development of dedicated software before the hardware is available. Low-consumption CPUs such as ARM play a central role in
D. August   +4 more
core   +4 more sources

Home - About - Disclaimer - Privacy