Hypertracing: Tracing Through Virtualization Layers

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks

Spraying is a common payload delivery technique used by attackers to execute arbitrary code in presence of Address Space Layout Randomisation (ASLR). In this paper we present Graffiti, an efficient hypervisorbased memory analysis framework for the detection and prevention of spraying attacks. Compared with previous solutions, our system is the first to offer an efficient, complete, extensible, ...

متن کامل

Optimization Models for Flexible and Adaptive SDN Network Virtualization Layers

Network hypervisors provide the network virtualization layer for Software Defined Networking (SDN). They enable virtual network (VN) tenants to bring their SDN controllers to program their logical networks individually according to their demands. In order to make use of the high flexibility of virtual SDN networks and to provide high performance, the deployment of the virtualization layer needs...

متن کامل

Enhancing the Disaster Recovery Plan Through Virtualization

Currently, organizations are increasingly aware of the need to protect their computer infrastructure to maintain continuity of operations. This process involves a number of different concerns including: managing natural disasters, equipment failure, and security breaches, poor data management, inadequate design, and complex/impractical design. The purpose of this article is to delineate how vir...

متن کامل

Safe and scalable build automation through virtualization

Hardware virtualization is often used to achieve isolation of one application from another, while still allowing to run the applications on the same physical hardware for better utilization; using separate machines might have been an alternative. Often, people associate this scenario with long-running tasks, such as web servers or other services offered in the network. In this paper, we discuss...

متن کامل

Protecting Mobile Agents through Tracing

Mobile code systems provide a exible and powerful platform to build distributed applications in an Internet scale, but they rise strong requirements from the security point of view. Security issues include authentication of the di erent remote parties involved and protection of the execution environments from malicious agents. Nonetheless, the most di cult task is to protect roaming agents from...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Cloud Computing

سال: 2021

ISSN: 2168-7161,2372-0018

DOI: 10.1109/tcc.2018.2874641