Sciweavers

1194 search results - page 13 / 239
» Virtualization of Hardware - Introduction and Survey
Sort
View
CCS
2008
ACM
15 years 3 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
USENIX
2008
15 years 4 months ago
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
: The paravirtualized I/O driver domain model, used in Xen, provides several advantages including device driver isolation in a safe execution environment, support for guest VM tran...
Jose Renato Santos, Yoshio Turner, G. John Janakir...
RSP
1998
IEEE
109views Control Systems» more  RSP 1998»
15 years 5 months ago
A Technique for Combined Virtual Prototyping and Hardware Design
A technique to include virtual prototyping in the design cycle of complex digital modem ASICs is presented. It is innovating by using the same behavioral description for both the ...
Patrick Schaumont, Geert Vanmeerbeeck, E. Watzeels...