Results 61 to 70 of about 5,262 (215)
Punxa: A Python‐Based RISC‐V System Simulator for Education
This work introduces an interactive co‐simulation framework that helps students understand computer architecture by bridging hardware and software analysis. Prioritizing detailed analysis over performance, it provides an integrated environment for iterative design, performance evaluation, and debugging.
David Castells‐Rufas +2 more
wiley +1 more source
enCloud: Aspect‐oriented trusted service migration on SGX‐enabled cloud VM
Abstract This paper presents enCloud, a new aspect‐oriented trusted service migration with SGX‐enabled cloud VM. Addressing the challenge of reconciling end‐to‐end security with VM migration, enCloud incorporates two key aspects: (1) end‐to‐end security for enclave context migration, and (2) VM abstraction for conventional VM context migration.
Seehwan Yoo +4 more
wiley +1 more source
Survey on open‐source digital twin frameworks–A case study approach
Abstract Digital twin (DT) technology has been a topic with academic and industrial coverage in recent years. DTs are intended to be a virtual high‐fidelity representation of a physical counterpart. Its complex nature requires several components to create and run a DT, and that is why many DT frameworks have been proposed in the literature.
Santiago Gil +3 more
wiley +1 more source
Using ABI for virtual machines introspection
The paper proposes an approach to introspection of virtual machines using the applications binary interface. The purpose of the method is to get information about the system, while having a minimum knowledge about its internal structure.
N. I. Fursova +2 more
doaj +1 more source
The problem of RED-module mathematical model results verification, based on GNS3 experimental stand, is discussed in this article. The experimental stand consists of virtual Cisco router, traffic generator D-ITG and traffic receiver.
Korolkova, A. V. +2 more
core +1 more source
The progress, challenges, and perspectives of directed greybox fuzzing
Based on the investigation of 42 state‐of‐the‐art fuzzers that are closely related to directed greybox fuzzing (DGF), we conduct the first in‐depth study to summarize the empirical evidence on the research progress of DGF. By analyzing the benefits and limitations of DGF research, we try to identify gaps in current research.
Pengfei Wang +5 more
wiley +1 more source
Identifying exploitable memory objects for out‐of‐bound write vulnerabilities
The study proposes a novel method for identifying potential exploitable memory objects. It focuses on corrupted data propagation processes and designs a corrupted data‐oriented fuzzing method. Abstract Exploiting an out‐of‐bounds write vulnerability in general‐purpose applications has become a current research focus.
Runhao Li, Bin Zhang, Chaojing Tang
wiley +1 more source
Initial explorations of ARM processors for scientific computing
Power efficiency is becoming an ever more important metric for both high performance and high throughput computing. Over the course of next decade it is expected that flops/watt will be a major driver for the evolution of computer architecture.
Abdurachmanov, David +3 more
core +1 more source
An Emulator for Approximate Memory Platforms Based on QEmu
In this paper, an emulation environment for approximate memory architectures is presented. In the context of error tolerant applications, in which energy is saved at the expense of the occurrence of errors in data processing, approximate memories play a relevant part. Approximate memories are memories where read/write errors are allowed with controlled
Menichelli, Francesco +3 more
openaire +1 more source
Abstract Cloud computing has become a critical infrastructure for modern society, like electric power grids and roads. As the backbone of the modern economy, it offers subscription‐based computing services anytime, anywhere, on a pay‐as‐you‐go basis. Its use is growing exponentially with the continued development of new classes of applications driven ...
Rajkumar Buyya +2 more
wiley +1 more source

