Sciweavers

318 search results - page 15 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
CLUSTER
2007
IEEE
14 years 2 months ago
High performance virtual machine migration with RDMA over modern interconnects
— One of the most useful features provided by virtual machine (VM) technologies is the ability to migrate running OS instances across distinct physical nodes. As a basis for many...
Wei Huang, Qi Gao, Jiuxing Liu, Dhabaleswar K. Pan...
USS
2010
13 years 6 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis
ITICSE
2010
ACM
14 years 28 days ago
The SOM family: virtual machines for teaching and research
This paper introduces the SOM (Simple Object Machine) family of virtual machine (VM) implementations, a collection of VMs for the same Smalltalk dialect addressing students at diï...
Michael Haupt, Robert Hirschfeld, Tobias Pape, Gre...
ASPLOS
2004
ACM
14 years 2 months ago
Devirtualizable virtual machines enabling general, single-node, online maintenance
Maintenance is the dominant source of downtime at high availability sites. Unfortunately, the dominant mechanism for reducing this downtime, cluster rolling upgrade, has two short...
David E. Lowell, Yasushi Saito, Eileen J. Samberg
CCGRID
2001
IEEE
14 years 7 days ago
OVM: Out-of-Order Execution Parallel Virtual Machine
High performance computing on parallel architectures currently uses different approaches depending on the hardory model of the architecture, the abstraction level of the programmi...
George Bosilca, Gilles Fedak, Franck Cappello