The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Carrier network service infrastructures are becoming increasingly complex since thousands of service-specific hardware-based network nodes are implemented to support a wide variety of network services. This has resulted in critically high increases in the maintenance costs to ensure service quality for network services and the deployment costs for new network services. Addressing these problems requires...
This paper presents the type-2 micro virtual machine monitor (ViMo-T2) for ARM-based mobile systems. It is implemented as a kernel module of the host operating system (OS) and enables to run multiple OSs on a single mobile device simultaneously. Since ViMo-T2 is layered upon the host OS that was already installed by a device manufacture, it is applicable to the existing mobile system at user's own...
In this paper a communication monitoring technology for host based on virtual man chine monitor is proposed. It can use the high privilege of virtual machine monitor to monitor the communication by capturing the network interruption of network interface card and analysing the data of network interface card. The results show that it can monitor the communication of host and effective protect the host.
One of the main sources of fault occurrence in commodity operating system are bugs in device drivers. So, one way to improve system security is to improve reliability of drivers by enforcing proper security policies. In this paper a new method to improve driver's reliability by inlined reference monitor (IRM) is proposed. Virtual machine monitor (VMM) is used to enforce IRM. So without any change...
Virtualization enables multiple guest operating systems run on a single physical platform. These virtual machines may host any types of application, including concurrent HPC programs. Traditionally, VMM schedulers have focused on fairly sharing the processor resources among domains, rarely consider VCPUs' behaviors. However, this can result in poor application performance to overcommitted domains...
Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system...
Intel and AMD have provided hardware support, VT and SVM, to support classical full virtualization. The hardware extensions help to implement a VMM without changing the guest OS or resorting to software binary translation. Ironically, a VMM using VT or SVM has not yet met performance expectation. One major reason is that there still exist too many VM exits that incur significant overhead. This paper...
Virtualization is a technology that enables running two or more operating systems simultaneously on a single computer. This paper will explain how virtualization software operates, compare the major types of virtualization software available, and explain how virtualization can reduce hardware cost in automatic test systems.
The overhead caused by virtualization makes it difficult to apply VM in the applications which require high degrees of both performance isolation and efficiency, such as the high performance computing. In this paper, we present a lightweight virtual machine, named Solo. It simplifies the design of VMM greatly by making most privileged instructions bypass the VMM, except the I/O operations. Solo allows...
Numerous approaches have been investigated to achieve single system image in order to simplify the complexity of programming and administration of cluster. This paper focuses on virtualization approach and presents NEX, a system of cooperative hypervisors with single system image support. NEX could provide a virtual SMP machine over cluster nodes. Commodity operating systems that support SMP could...
With its growth and wide applications, virtualization has come through a revival in computer system community. Virtualization offers a lot of benefits including flexibility, security, ease to configuration and management, reduction of cost and so forth, but at the same time it also brings a certain degree of performance overhead. Furthermore, virtual machine monitor (VMM) is the core component of...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor...
Virtualization trims administrative overhead, eases system management, and combats OS-level security vulnerabilities. However, it also exhibits new characteristics and exposes new vulnerabilities that can be detrimental to securing the system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.