Sciweavers

318 search results - page 9 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
HPCA
2007
IEEE
14 years 7 months ago
Concurrent Direct Network Access for Virtual Machine Monitors
This paper presents hardware and software mechanisms to enable concurrent direct network access (CDNA) by operating systems running within a virtual machine monitor. In a conventi...
Jeffrey Shafer, David Carr, Aravind Menon, Scott R...
RTCSA
1999
IEEE
13 years 11 months ago
Hard Real-Time Garbage-Collection in the Jamaica Virtual Machine
Java's automatic memory management is the main reason that prevents Java from being used in hard realtime environments. We present the garbage collection mechanism that is us...
Fridtjof Siebert
CSSE
2008
IEEE
14 years 1 months ago
Design and Implementation of the Virtual Machine Constructing on Register
: The technology of virtual machines is widely applied in many fields, such as code transplanting, cross-platform computing, and hardware simulation. The main purpose is to simulat...
Weibo Xie, Fu Ting
ASM
2008
ASM
13 years 9 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright
ISSRE
2010
IEEE
13 years 5 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...