Sciweavers

318 search results - page 3 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SIGOPS
2008
95views more  SIGOPS 2008»
13 years 7 months ago
Virtual machine time travel using continuous data protection and checkpointing
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve vi...
Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael...
USENIX
2008
13 years 9 months ago
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...
Byung-Gon Chun, Petros Maniatis, Scott Shenker
CCS
2010
ACM
13 years 7 months ago
DieHarder: securing the heap
Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. We analyze a range of widely-deployed memory allocators, including thos...
Gene Novark, Emery D. Berger
ECOOP
2007
Springer
14 years 1 months ago
Object-Relative Addressing: Compressed Pointers in 64-Bit Java Virtual Machines
64-bit address spaces come at the price of pointers requiring twice as much memory as 32-bit address spaces, resulting in increased memory usage. Increased memory usage is especia...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...
EUROMICRO
2004
IEEE
13 years 11 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour