نتایج جستجو برای: virtual machine memory

تعداد نتایج: 637549  

2003
Kasper V. Lund Jakob R. Andersen

More than 90% of the microprocessors produced today are used in embedded devices. With the current development tools, it is exceedingly difficult to debug, profile, and update code running on embedded devices in operation. This leaves developers unable to diagnose and solve software issues on deployed embedded systems, something that is unacceptable for an industry where robustness is paramount...

2009
J. Winett

The Lincoln Laboratory IBM 360/67 is connected to the ARPA network and acts as a serving host providing access to the CP-67 virtual machine operating system. Upon completion of the Login procedure, users have control of a 360 virtual machine through a virtual 1052 online console. Attached to the virtual machine is a virtual card reader, card punch and line printer, and a number of disk storage ...

Journal: :CoRR 2017
Zhao-Hui Du Zhiwei Ying Zhenke Ma Yufei Mai Phoebe Wang Jesse Liu Jesse Fang

Virtualization has become more important since cloud computing is getting more and more popular than before. There’s an increasing demand for security among the cloud customers. AMD plans to provide Secure Encrypted Virtualization (SEV)​[8] technology in its latest processor EPYC to protect virtual machines by encrypting its memory but without integrity protection. In this paper, we analyzed th...

2016
Yu Shuchun Qiu Lin

Aiming at the reasonable configuration of virtual cluster and physical host, a new virtual machine cluster scheduling method is proposed. First of all, according to the resource requirements of the task, select the resource conditions similar to the virtual machine cluster. In the clustering process, the CPU, memory, communication bandwidth and other parameters are integrated in a measure under...

2013
Gulshan Soni Mala Kalra

Virtualization technology is currently becoming increasingly popular and valuable in cloud computing environments due to the benefits of server consolidation, live migration, and resource isolation. Live virtual machine migration is the process of moving virtual machine from one physical host to other without disturbing the users. Effective migration of virtual machine requires the movement of ...

2011
Pierre Riteau Christine Morin Thierry Priol

Live virtual machine migration is a powerful feature of virtualization technologies. It enables efficient load balancing, reduces energy consumption through dynamic consolidation, and makes infrastructure maintenance transparent to users. While live migration is available across wide area networks with state of the art systems, it remains expensive to use because of the large amounts of data to...

1999
Timothy L Harris

In this paper I present a new approach to designing virtual machines. I argue that the monolithic structure of existing systems leads to unnecessarily rigid high-level abstractions being imposed on applications. In contrast, I propose an extensible approach within which key parts of the virtual machine can be updated independently of one another. Furthermore, the proposed approach allows untrus...

2014
Ishan Banerjee Jui-Hao Chiang Kiran Tati

Modern operating systems specialize in partitioning the physical compute resources of a computer among software applications. Effective partitioning of physical resources enables multiple applications to securely execute on the same physical machine while maintaining performance isolation. In a virtualized environment, a hypervisor partitions physical resources, among virtual machines. This ena...

2012
Tamas K. Lengyel Justin Neumann Steve Maresca Bryan D. Payne Aggelos Kiayias

With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as a means to implement automated malware collection and analysis. We introduce VMIHoneymon, a high-interaction honeypot monitor which uses virtual machine memory introspection on Xen. VMI-Honeymon remains transparent to the monitored virtual machine and bypasses relianc...

2011
Jennia Hizver Tzi-cker Chiueh

Retail industry Point of Sale (POS) computer systems are frequently targeted by hackers for credit/debit card data. Faced with increasing security threats, new security standards requiring encryption for card data storage and transmission were introduced making harvesting card data more difficult. Encryption can be circumvented by extracting unencrypted card data from the volatile memory of POS...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید