Sciweavers

137 search results - page 11 / 28
» Justifying Integrity Using a Virtual Machine Verifier
Sort
View
SOSP
2003
ACM
14 years 4 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
IPPS
1998
IEEE
13 years 11 months ago
Runtime Support for Virtual BSP Computer
Abstract. Several computing environments including wide area networks and nondedicated networks of workstations are characterized by frequent unavailability of the participating ma...
Mohan V. Nibhanupudi, Boleslaw K. Szymanski
HAPTICS
2008
IEEE
14 years 2 months ago
Electrotactile Stimulation Based on Strain Energy Density of the Fingertip
Abstract. The shape recognition of an object is important for dexterous manipulation by humans. Therefore, we have developed a haptic display that integrates both electrotactile an...
Katsunari Sato, Hideaki Nii, Naoki Kawakami, Susum...
SOSP
2007
ACM
14 years 4 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...