Sciweavers

185 search results - page 16 / 37
» Analysis of virtual machine system policies
Sort
View
104
Voted
ISW
2007
Springer
15 years 6 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
108
Voted
SACMAT
2010
ACM
14 years 10 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
15 years 7 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...
ASPLOS
2006
ACM
15 years 6 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
106
Voted
EDUTAINMENT
2007
Springer
15 years 4 months ago
A 3D Virtual Learning Environment to Foster Communication for Long Term Ill Children
In this paper, we present a virtual learning environment which supports the learning process of long term sick children. By focusing on 3D Virtual Environments technology chronical...
Fabian Di Fiore, Pieter Jorissen, Gert Vansichem, ...