🦞🌯 Lobster Roll

Thread

vpwns: Virtual Pwned Networks (usenix.org)

Stories related to "vpwns: Virtual Pwned Networks" across the full archive.

vpwns: Virtual Pwned Networks (usenix.org)
Security of OS-level virtualization technologies (arxiv.org)
Security aspects of virtualization (enisa.europa.eu)
vLibOS: Babysitting OS Evolution with a Virtualized Library OS (arxiv.org)
The Evolution of an x86 Virtual Machine Monitor (2010) (ece.cmu.edu)
Abstract: "Twelve years have passed since VMware engineers first virtualized the x86 architecture. This technological breakthrough kicked off a transformation of an entire industry, and virtualization is now (once again) a thriving business with a wide range of solutions being deployed, developed a...
Live Migration of Virtual Machines between Heterogeneous Host Systems (2008) (hypervisor.org)
Abstract: "The [NOVA microhypervisor](http://hypervisor.org) and its companion user-level virtual-machine monitor facilitate the construction of systems with minimal, application-specific, trusted, computing bases. On NOVA, virtual machines provide a way for reusing existing legacy software and for ...
The SOM Family: Virtual Machines for Teaching and Research (2010) (hpi.uni-potsdam.de)
Abstract: "This paper introduces the SOM (Simple Object Machine) family of virtual machine (VM) implementations, a collection of VMs for the same Smalltalk dialect addressing students at different levels of expertise. Starting from a Javabased implementation, several ports of the VM to different...
Secure Browser Architecture Based on Hardware Virtualization (citeseerx.ist.psu.edu)
Abstract: "Ensuring the entire code base of a browser to deal with the security concerns of integrity and confidentiality is a daunting task. The basic method is to split it into different components and place each of them in its own protection domain. OS processes are the prevalent isolation me...
Virtualization Extensions into a Microkernel based Operating System (researchgate.net)
Secure Virtualization of Latency-Constrained Systems (2015) (qucosa.de)
No abstract provided. I'll write it myself then: This paper focuses on using virtualization in an embedded context where latency matters, such as engine control units. The author wants to consolidate more functions on fewer chips. Goals of this design are portability, support for legacy OS's, lat...
virtio: Towards a De-Facto Standard For Virtual I/O Devices (ozlabs.org)
Exploiting Unprotected I/O Operations inAMD’s Secure Encrypted Virtualization (usenix.org)
Hardware Assisted Virtualization Intel Virtualization Technology (zabaljauregui.com)
Protecting Your Privacy With a Virtual Machine While Using Zoom (blog.privacytools.io)
The Cost of Software-Based Memory Management Without Virtual Memory (arxiv.org)
[arXiv](https://arxiv.org/abs/2009.06789)
Blending Containers and Virtual Machines: A Study of Firecracker and gVisor (pages.cs.wisc.edu)
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators (flyer.sis.smu.edu.sg)
Microkernels Meet Recursive Virtual Machines (2007) (bford.info)
Virtualising Darwin on L4 (2007) (trustworthy.systems)
An Overview of Virtual Machine Architectures (didawiki.di.unipi.it)
Bringing Virtualization to the x86 Architecture with the Original VMware Workstation (2012) (web.archive.org)
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments (taviso.decsystem.org)
How Privacy in America Went Virtually Extinct in Just a Decade (alternet.org)
Sol — a sunny little virtual machine (rsms.me)
The Differences Between Onion Routing and Mix Networks (crypto.is)
150,000 cloud virtual machines will help solve mysteries of the Universe (arstechnica.com)
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization (ieee-security.org)
OVF? OVA? VMDK? – File Formats and Tools for Virtualization (spin.atomicobject.com)
Building a Virtual Machine "Appliance" Image - Repeatably (spin.atomicobject.com)
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization (ieee-security.org)