Sciweavers

318 search results - page 48 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
ANCS
2010
ACM
13 years 6 months ago
sNICh: efficient last hop networking in the data center
: sNICh: Efficient Last Hop Networking in the Data Center Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox, Scott Rixner, Partha Ranganathan, Jose Renato Santos HP Laboratories H...
Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox,...
OSDI
2004
ACM
14 years 9 months ago
Configuration Debugging as Search: Finding the Needle in the Haystack
This work addresses the problem of diagnosing configuration errors that cause a system to function incorrectly. For example, a change to the local firewall policy could cause a ne...
Andrew Whitaker, Richard S. Cox, Steven D. Gribble
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 4 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
ACSAC
2009
IEEE
14 years 3 months ago
HIMA: A Hypervisor-Based Integrity Measurement Agent
Abstract—Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to provide both strong isolation between the ...
Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan ...
ICCD
2003
IEEE
143views Hardware» more  ICCD 2003»
14 years 5 months ago
Cost-Effective Graceful Degradation in Speculative Processor Subsystems: The Branch Prediction Case
We analyze the effect of errors in branch predictors, a representative example of speculative processor subsystems, to motivate the necessity for fault tolerance in such subsystem...
Sobeeh Almukhaizim, Thomas Verdel, Yiorgos Makris