-
1
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
Published 2017Get full text
Conference or Workshop Item -
2
Modeling virtualized application performance from hypervisor counters
Published 2011Get full text
Thesis -
3
Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
Published 2017“…This is done by monitoring incoming network packets from the Hypervisor’s netback driver. This solution has the benefit of the user of the virtual machine or virtual server not having to modify or worry about placing restrictions on their TLS server, as TLS Security is handled by the Hypervisor without the interference of the virtual machine. …”
Get full text
Final Year Project (FYP) -
4
Embedded virtualization of a hybrid ARM - FPGA computing platform
Published 2014“…An integrated hardware accelerator running on the FPGA under hypervisor control is developed as a prototype to evaluate the ability and functionality of the modified hypervisor. …”
Get full text
Thesis -
5
Profiling the performance of P4080DS
Published 2015“…This report contains detailed procedures of both hypervisor approach and hardware approach. The hypervisor approach created 8 partitions by modifying the device tree of hypervisor. …”
Get full text
Final Year Project (FYP) -
6
-
7
ANALISIS DAN IMPLEMENTASI VIRTUALISASI DATA CENTER DI ICT CENTER FKIP UNS
Published 2014“…In this research, we use hypervisor virtualization to overcome limitations of server hardware, hypervisor virtualization choosen because it has a lower overhead and better performance than other types of virtualization. …”
Thesis -
8
Tracking working set sizes of virtual machines using miss ratio curves
Published 2018Get full text
Thesis -
9
Architecting Trust: Building Secure and High-Performance Confidential VMs
Published 2023“…We specifically focus on the task of secure CPU virtualization and build a security monitor that hides the virtual CPU register state from the hypervisor during context switches. To allow the hypervisor to properly handle interrupts and emulate instructions, we summarize a specification listing which registers need to be exposed in specific scenarios. …”
Get full text
Thesis -
10
-
11
The art of RT-Xen
Published 2015“…The report is organized into the following topics: Background of RT-Xen hypervisor, analysis of different types of scheduler and priority schemes, setting up of related systems, overview of MCS, design and implementation of MCS, and possible future improvements.…”
Get full text
Final Year Project (FYP) -
12
Profiling a multi-core (Freescale P4080)
Published 2016“…We will be exploring the use of a hypervisor to securely and robustly partition a multi-core system and try to emulate Asymmetric Multiprocessing (AMP) implementations. …”
Get full text
Final Year Project (FYP) -
13
Federated deep learning for edge computing (part I)
Published 2020“…The output of part I of this project creates a virtual image (OVA format) that can be launched on a hypervisor such as oracle virtual box.…”
Get full text
Final Year Project (FYP) -
14
Cloud computing and conflicts with digital forensic investigation
Published 2013“…Implementing multi-factor authentication, utilizing Trusted Platform Module (TPM) in Hypervisor and applying specific changes in the Cloud Service Provider (CSP) contract to provide persistent storage to the customer are parts of suggested approaches, capable of making the current digital forensic investigation practices applicable to the cloud computing environments. …”
Get full text
Article -
15
Implementing virtual machine:a performance evaluation
Published 2019“…A hypervisor is a hardware virtualization technique that allows multiple guest operating systems to run on a single host machine at the same time. …”
Get full text
Conference or Workshop Item -
16
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. The prevention model uses principal component analysis and linear discriminant analysis with a hybrid, nature-inspired metaheuristic algorithm called Ant Lion optimisation for feature selection and artificial neural networks to classify and configure the cloud server. …”
Get full text
Book Chapter -
17
Forensics investigation challenges in cloud computing environments
Published 2012“…This paper suggests a simple yet very useful solution to conquer the aforementioned issues in forensic investigation of cloud systems. Utilizing TPM in hypervisor, implementing multi-factor authentication and updating the cloud service provider policy to provide persistent storage devices are some of the recommended solutions. …”
Get full text
Conference or Workshop Item -
18
A new secure proxy-based distributed virtual machines management in mobile cloud computing
Published 2019“…The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. …”
Get full text
Article -
19
Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks
Published 2012“…Our implementation of the attester is within the Xen hypervisor. By analyzing traces of keyboard and mouse activity from 328 users at Intel, together with adversarial traces of spam, DDoS, and click-fraud activity, we estimate that NAB reduces the amount of spam that currently passes through a tuned spam filter by more than 92%, while not flagging any legitimate email as spam. …”
Get full text
Get full text
Article -
20
Aikido: Accelerating shared data dynamic analyses
Published 2012“…Aikido runs a custom hypervisor below the operating system, which exposes per-thread hardware protection mechanisms not available in any widely used operating system. …”
Get full text
Get full text
Article