Sciweavers

17 search results - page 3 / 4
» Multitasking without Compromise: A Virtual Machine Evolution
Sort
View
CCS
2009
ACM
14 years 6 days ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
APSEC
2004
IEEE
13 years 9 months ago
Partitioning of Java Applications to Support Dynamic Updates
The requirement for 24/7 availability of distributed applications complicates their maintenance and evolution as shutting down such applications to perform updates may not be an a...
Robert Pawel Bialek, Eric Jul, Jean-Guy Schneider,...
INFOCOM
2012
IEEE
11 years 7 months ago
SageShift: Managing SLAs for highly consolidated cloud
– Maximizing consolidation ratio, the number of virtual machines (VMs) in a physical machine, without violating customers’ SLAs is an important goal in the cloud. We show that ...
Orathai Sukwong, Akkarit Sangpetch, Hyong S. Kim
ANSS
2002
IEEE
13 years 10 months ago
Temporal Uncertainty Time Warp: An Agent-Based Implementation
This paper introduces TUTW – Temporal Uncertainty Time Warp – a control engine designed for an exploitation of temporal uncertainty (TU) in general optimistic simulations, and...
Roberto Beraldi, Libero Nigro, Antonino Orlando, F...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
13 years 11 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee