Results 71 to 80 of about 5,262 (215)
The aim of this paper is the analysis of the performance of virtualization and containerization technologies in the context of IT infrastructure. The following virtualization technologies were selected for the study: VirtualBox, VMware and QEMU, as well ...
Sebastian Tarasiuk +4 more
doaj +1 more source
Open-TEE - An Open Virtual Trusted Execution Environment
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises
Asokan, N. +3 more
core +1 more source
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Source code vulnerabilities are one of the significant threats to software security. Existing deep learning‐based detection methods have proven their effectiveness. However, most of them extract code information on a single intermediate representation of code (IRC), which often fails to extract multiple information hidden in the code fully ...
Xiansheng Cao +4 more
wiley +1 more source
Optimizations in Dynamic Binary Translation
Binary translation is a process of constructing program Q's binary code from program P's binary code according to a certain specification. If a binary translation is performed in runtime it is called dynamic binary translation. We evaluate application of
Kirill Batuzov, Alexey Merkulov
doaj
Separation of Virtual Machine I/O in Cloud Systems
Virtualization is widely used in modern computer systems ranging from personal computers to cloud servers as it provides various heterogeneous platforms at low cost.
Hyokyung Bahn, Jisun Kim
doaj +1 more source
The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing
Most greybox fuzzing tools are coverage-guided as code coverage is strongly correlated with bug coverage. However, since most covered codes may not contain bugs, blindly extending code coverage is less efficient, especially for corner cases.
Liu, Yingying +4 more
core
Two approaches to full-system deterministic replay in QEMU
In the paper we evaluate two approaches to full-system deterministic replay. Both of them allow replaying guest OS and applications without modifications.
K. Batuzov +3 more
doaj
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for ...
Shuangxi CHEN +4 more
doaj +2 more sources
MH-QEMU: Memory-State-Aware Fault Injection Platform [PDF]
As we move towards higher-density, larger-scale, and lower-power computing hardware, new types of failures are being experienced with increasing frequency. Hardware designed for the post-Moore generation are also bringing about novel resiliency challenges. In order to improve the efficiency of resiliency methods, fault injection plays an important role
Hideyuki Jitsumoto +3 more
openaire +1 more source
Local Register Allocation Problem in Dynamic Binary Translation
QEMU is a generic machine emulator based on a dynamic binary translation approach. This paper evaluates possible improvements to the local register allocation algorithm in QEMU.
Kirill Batuzov
doaj

