Sciweavers

185 search results - page 23 / 37
» Analysis of virtual machine system policies
Sort
View
CCS
2011
ACM
14 years 10 days ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
ASPLOS
2008
ACM
15 years 2 months ago
The mapping collector: virtual memory support for generational, parallel, and concurrent compaction
Parallel and concurrent garbage collectors are increasingly employed by managed runtime environments (MREs) to maintain scalability, as multi-core architectures and multi-threaded...
Michal Wegiel, Chandra Krintz
103
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 8 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
107
Voted
SETP
2007
15 years 1 months ago
Using Communication Objects During Requirements Analysis
Requirement analysis continues to be one of the most critical and challenging phases during the software development process. Many object-oriented methodologies identify three pri...
Peter J. Clarke, Yingbo Wang, Tuan L. Cameron, Yal...