Sciweavers

196 search results - page 19 / 40
» Secure in-VM monitoring using hardware virtualization
Sort
View
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
14 years 1 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
ASPLOS
2008
ACM
13 years 10 months ago
Accelerating two-dimensional page walks for virtualized systems
Nested paging is a hardware solution for alleviating the software memory management overhead imposed by system virtualization. Nested paging complements existing page walk hardwar...
Ravi Bhargava, Ben Serebrin, Francesco Spadini, Sr...
OOPSLA
2009
Springer
14 years 3 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 3 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
14 years 26 days ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet