Sciweavers

318 search results - page 3 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SIGOPS
2008
95views more  SIGOPS 2008»
14 years 9 months ago
Virtual machine time travel using continuous data protection and checkpointing
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve vi...
Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael...
USENIX
2008
14 years 12 months ago
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...
Byung-Gon Chun, Petros Maniatis, Scott Shenker
CCS
2010
ACM
14 years 9 months ago
DieHarder: securing the heap
Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. We analyze a range of widely-deployed memory allocators, including thos...
Gene Novark, Emery D. Berger
ECOOP
2007
Springer
15 years 3 months ago
Object-Relative Addressing: Compressed Pointers in 64-Bit Java Virtual Machines
64-bit address spaces come at the price of pointers requiring twice as much memory as 32-bit address spaces, resulting in increased memory usage. Increased memory usage is especia...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...
EUROMICRO
2004
IEEE
15 years 1 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour