The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the work on VM network performance has focused so far on bulk TCP traffic, which covers classical applications of virtualization. Completely new “paravirtualized devices” (Xenfront, VIRTIO, vmxnet) have been designed and implemented to improve network throughput.
This paper presents a significantly improved strategy for accelerating the method calls in the REALJava coprocessor. The hardware assisted virtual machine architecture is described shortly to provide context for the method call acceleration. The strategy is implemented in an FPGA prototype. It allows measurements of real life performance increase, and validates the whole co-processor concept. The...
This paper presents a mission language, is called Tiny Mission Language (TML), for the ISiMI100 Autonomous Underwater Vehicle (AUV) which was developed by MOERI-KORDI. The TML can represent any mission easily and freely because it provides most functionality supported by general programming language. The TML provides control statements for management of execution sequence, variable usage for temporary...
Serv-U's ODBC database connection techniques is introduced to achieve real-time FTP user account opening procedures combined with real-time opening ASP hosting space, so users can instantly upload your own information or websites, the descriptions can be achieved more popular virtual Construction of the host space. The realization principle is presented firstly, then the realization steps of virtual...
Nowadays, computing resources have taken tens percent of utilization at busy time for increasing computing power. However, the virtual machine (VM) technology is effective to the use of computing resources. Besides, the vulnerable services in VM prevent the affect of the other VM attacks. For example, Amazon has applied the VM method to run in real machine (Host OS) independently but attackers can...
Upon the basis of the article: formal requirements for virtualizable third generation architectures, we propose an extended model for a modern computer architecture and prove the correctness of the theorem for virtualizability on the level of ISA via this model. Some discussions are also made about the efficiency of applications executed in a virtual machine from two different aspects: the instruction...
As the continuous employment of the state-of-the-art technology such as polymorphism, metamorphism used by malware to avoid the anti-virus detection systems, virtual machine which forces malware converting into its original form by executing it in a virtual environment has played an increasingly important role in malware detection system. In this paper, we introduce all types of virtual machines and...
Cross platform debugging can make the software debugging and hardware platform developing work simultaneity in embedded system development, which accelerates the development lifecycle dramatically. Reverse execution can run program backward to historic points, may provide programmers with a useful approach of fast locating the cause of the program failure. In this paper, we propose a reversible debugging...
Integrating real-time and general-purpose operating systems into a single embedded device is promising scheme to support both real-time responsiveness and rich functionality with reasonable engineering cost. However, even if the modification for a single combination of real-time and general-purpose operating systems is small, it would be problematic when considering combinations of various operating...
The technology of virtual machines is widely applied in many fields, such as code transplanting, cross-platform computing, and hardware simulation. The main purpose is to simulate the environment of general hardware by means of software and realize the operation of byte codes in processor. Virtual machines are commonly used to distribute programs in an architecture-neutral format, which can easily...
In this paper, we propose a Java accelerator named Javelin (Java enhanced language interpreter) based on a hardware translation method. To overcome performance hurdles in translation based accelerators, we assign registers in the host processor for frequently accessed pointers, entries of the stack, local variables, and intermediate values during bytecode execution. We propose an operand exchange...
Absolute protection of mobile agents from attacks by malicious hosts is an open research problem. We propose a software based paradigm whereby an agent is protected from various static and dynamic attacks from a malicious host of an unknown hardware configuration, for a specific period of time. This time interval is computed by restricting the maximum resources that may be available to the adversary...
The VMware Workstation virtualisation software is widely used by antivirus researchers for malware analysis. However, a large amount of current generation malware employs various anti-VMware techniques in order to resist analysis. To make things worse, these anti-VMware techniques are applied not only in the payload itself, but also in the runtime packer that is used to disguise the malicious code...
One of the most important obstacles when porting an application to the Grid is its highly heterogeneous nature. This heterogeneity usually means an increase of the cost of both the application porting cycle and the operational cost of the infrastructure. Moreover, the effective number of resources available to a user are also limited by this heterogeneity. In this paper we presents two approaches...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor...
Information infection and information leakage in computer systems are mainly caused by insecure network access. Considering the particularity of network security, a tool DTAD (dynamic taint analysis detector) for information flow security detection is designed and implemented, aiming at the problem of data security in network access. This tool performs log recording and state controlling for malicious...
We present a software environment for the efficient simulation of cellular processor arrays (CPAs). This software is used to explore algorithms that are designed for CPAs, neuromorphic arrays, multi-layer neural networks and vision chips. The software (APRON) uses a highly optimised core combined with a flexible compiler to provide the user with tools for the prototyping of new array hardware and...
Currently stealth malware is becoming a major threat to the PC computers. Process hiding is the technique commonly used by stealth malware to evade detection by anti-malware scanners. On the defensive side, previous host-based approaches will be defeated once the privileged stealth malware controls a lower reach of the system. The virtual machine (VM) based solutions gain tamper resistance at the...
Memory forensics is growing concern. For effective evidence retrieval, it is important to take snapshot timely. With proper modification of guest OS, VMM is powerful tool for timely snapshot. In this paper, we propose an incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques. We modify debug register handler to invoke snapshot facility of VMM. Software interrupt...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.