نتایج جستجو برای: vmware

تعداد نتایج: 362  

2007
Peter Ferrie

As virtual machine emulators have become commonplace in the analysis of malicious code, malicious code has started to fight back. This paper describes known attacks against the most widely used virtual machine emulators (VMware and VirtualPC). This paper also demonstrates newly discovered attacks on other virtual machine emulators (Bochs, Hydra, QEMU, and Xen), and describes how to defend again...

2004

VMware Virtual Desktop Infrastructure (VDI) is a PC management solution for enterprise desktop administrators. VDI is a server-based computing offering that provides desktop environments as an enterprise hosted service. VDI allows administrators to maintain and manage all user applications, data, and environments in the centrally located data center. VDI provides a true, isolated PC environment...

2011

The performance of three Hadoop applications is reported for several virtual configurations on VMware vSphere 5 and compared to native configurations. A well-balanced seven-node AMAX ClusterMax system was used to show that the average performance difference between native and the simplest virtualized configurations is only 4%. Further, the flexibility enabled by virtualization to create multipl...

2006

Enterprises continue to move their technologies and services onto the Web. Today, the Web servers that provide these services are distributed across multiple systems. As the number of Web applications increases, it is very common for the number of physical systems in the data center hosting these Web applications to increase along with them. Studies from IDC, among others, describe the challeng...

2002

VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims the pages considered least valuable by the operating system running in a virtual machine. An idle memory t...

Journal: :IACR Cryptology ePrint Archive 2014
Allison Bishop Yevgeniy Dodis

We consider interactive proof systems over adversarial communication channels. We show that the seminal result that IP = PSPACE still holds when the communication channel is malicious, allowing even a constant fraction of the communication to be arbitrarily corrupted. Supported in part by NSF CNS 1413971 and NSF CCF 1423306. Partially supported by gifts from VMware Labs and Google, and NSF gran...

2007
Peter Ferrie

As virtual machine emulators have become commonplace in the analysis of malicious code, malicious code has started to fight back. This paper describes known attacks against the most widely used virtual machine emulators (VMware and VirtualPC). This paper also demonstrates newly discovered attacks on other virtual machine emulators (Bochs, Hydra, QEMU, Sandbox, VirtualBox, and CWSandbox), and de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید