Sciweavers

318 search results - page 1 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SP
2003
IEEE
13 years 10 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
DAC
2005
ACM
14 years 5 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
IEE
2007
104views more  IEE 2007»
13 years 4 months ago
Complete distributed garbage collection using DGC-consistent cuts and .NET AOP-support
: The memory management of distributed objects, when done manually, is an error-prone task. It leads to memory leaks and dangling references, causing applications to fail. Avoiding...
Luís Veiga, P. Pereira, Paulo Ferreira
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
12 years 12 days ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
13 years 10 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...