Showing 1 - 20 results of 26 for search '"Hypervisor', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3

    Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers by Pathangi Janardhanan Jatinshravan

    Published 2017
    “…This is done by monitoring incoming network packets from the Hypervisor’s netback driver. This solution has the benefit of the user of the virtual machine or virtual server not having to modify or worry about placing restrictions on their TLS server, as TLS Security is handled by the Hypervisor without the interference of the virtual machine. …”
    Get full text
    Final Year Project (FYP)
  4. 4

    Embedded virtualization of a hybrid ARM - FPGA computing platform by Pham, Dang Khoa

    Published 2014
    “…An integrated hardware accelerator running on the FPGA under hypervisor control is developed as a prototype to evaluate the ability and functionality of the modified hypervisor. …”
    Get full text
    Thesis
  5. 5

    Profiling the performance of P4080DS by Zheng, Zhipeng

    Published 2015
    “…This report contains detailed procedures of both hypervisor approach and hardware approach. The hypervisor approach created 8 partitions by modifying the device tree of hypervisor. …”
    Get full text
    Final Year Project (FYP)
  6. 6
  7. 7

    ANALISIS DAN IMPLEMENTASI VIRTUALISASI DATA CENTER DI ICT CENTER FKIP UNS by , Puspanda Hatta, , Widyawan, S.T., M.Sc., Ph.D.

    Published 2014
    “…In this research, we use hypervisor virtualization to overcome limitations of server hardware, hypervisor virtualization choosen because it has a lower overhead and better performance than other types of virtualization. …”
    Thesis
  8. 8
  9. 9

    Architecting Trust: Building Secure and High-Performance Confidential VMs by Srivastava, Shashvat

    Published 2023
    “…We specifically focus on the task of secure CPU virtualization and build a security monitor that hides the virtual CPU register state from the hypervisor during context switches. To allow the hypervisor to properly handle interrupts and emulate instructions, we summarize a specification listing which registers need to be exposed in specific scenarios. …”
    Get full text
    Thesis
  10. 10
  11. 11

    The art of RT-Xen by Liu, Fan

    Published 2015
    “…The report is organized into the following topics: Background of RT-Xen hypervisor, analysis of different types of scheduler and priority schemes, setting up of related systems, overview of MCS, design and implementation of MCS, and possible future improvements.…”
    Get full text
    Final Year Project (FYP)
  12. 12

    Profiling a multi-core (Freescale P4080) by Ng, Daniel Jun Xian

    Published 2016
    “…We will be exploring the use of a hypervisor to securely and robustly partition a multi-core system and try to emulate Asymmetric Multiprocessing (AMP) implementations. …”
    Get full text
    Final Year Project (FYP)
  13. 13

    Federated deep learning for edge computing (part I) by See, Ian Soong En

    Published 2020
    “…The output of part I of this project creates a virtual image (OVA format) that can be launched on a hypervisor such as oracle virtual box.…”
    Get full text
    Final Year Project (FYP)
  14. 14

    Cloud computing and conflicts with digital forensic investigation by Damshenas, Mohsen, Dehghantanha, Ali, Mahmoud, Ramlan, Shamsuddin, Solahuddin

    Published 2013
    “…Implementing multi-factor authentication, utilizing Trusted Platform Module (TPM) in Hypervisor and applying specific changes in the Cloud Service Provider (CSP) contract to provide persistent storage to the customer are parts of suggested approaches, capable of making the current digital forensic investigation practices applicable to the cloud computing environments. …”
    Get full text
    Article
  15. 15

    Implementing virtual machine:a performance evaluation by Kamaludin, Hazalila, Jamal, Muhamad Yusmaleef, Ab Rahman, Nurul Hidayah, Mohd Safar, Noor Zuraidin, Abd Ishak, Suhaimi

    Published 2019
    “…A hypervisor is a hardware virtualization technique that allows multiple guest operating systems to run on a single host machine at the same time. …”
    Get full text
    Conference or Workshop Item
  16. 16

    Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing by Jaber, Aws Naser, Mohamad Fadli, Zolkipli, Shakir, Hasan Awni

    Published 2018
    “…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. The prevention model uses principal component analysis and linear discriminant analysis with a hybrid, nature-inspired metaheuristic algorithm called Ant Lion optimisation for feature selection and artificial neural networks to classify and configure the cloud server. …”
    Get full text
    Book Chapter
  17. 17

    Forensics investigation challenges in cloud computing environments by Damshenas, Mohsen, Dehghantanha, Ali, Mahmod, Ramlan, Shamsuddin, Solahuddin

    Published 2012
    “…This paper suggests a simple yet very useful solution to conquer the aforementioned issues in forensic investigation of cloud systems. Utilizing TPM in hypervisor, implementing multi-factor authentication and updating the cloud service provider policy to provide persistent storage devices are some of the recommended solutions. …”
    Get full text
    Conference or Workshop Item
  18. 18

    A new secure proxy-based distributed virtual machines management in mobile cloud computing by Annane, Boubakeur, Ghazali, Osman, Alti, Adel

    Published 2019
    “…The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. …”
    Get full text
    Article
  19. 19

    Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks by Gummadi, Ramakrishna, Balakrishnan, Hari, Maniatis, Petros, Ratnasamy, Sylvia

    Published 2012
    “…Our implementation of the attester is within the Xen hypervisor. By analyzing traces of keyboard and mouse activity from 328 users at Intel, together with adversarial traces of spam, DDoS, and click-fraud activity, we estimate that NAB reduces the amount of spam that currently passes through a tuned spam filter by more than 92%, while not flagging any legitimate email as spam. …”
    Get full text
    Get full text
    Article
  20. 20

    Aikido: Accelerating shared data dynamic analyses by Olszewski, Marek Krystyn, Zhao, Qin, Koh, David F., Ansel, Jason Andrew, Amarasinghe, Saman P.

    Published 2012
    “…Aikido runs a custom hypervisor below the operating system, which exposes per-thread hardware protection mechanisms not available in any widely used operating system. …”
    Get full text
    Get full text
    Article