Thread
Stories related to "vpwns: Virtual Pwned Networks" across the full archive.
Abstract: "Twelve years have passed since VMware engineers first virtualized the x86 architecture. This technological breakthrough kicked off a transformation of an entire industry, and virtualization
is now (once again) a thriving business with a wide range of solutions being deployed, developed a...
Abstract: "The [NOVA microhypervisor](http://hypervisor.org) and its companion user-level virtual-machine monitor facilitate the construction of systems with minimal, application-specific, trusted, computing bases. On NOVA, virtual machines provide a way for reusing existing legacy software and for ...
Abstract: "This paper introduces the SOM (Simple Object Machine)
family of virtual machine (VM) implementations, a collection
of VMs for the same Smalltalk dialect addressing students
at different levels of expertise. Starting from a Javabased
implementation, several ports of the VM to different...
Abstract: "Ensuring the entire code base of a browser to deal with
the security concerns of integrity and confidentiality is a
daunting task. The basic method is to split it into different
components and place each of them in its own protection domain.
OS processes are the prevalent isolation me...
No abstract provided. I'll write it myself then:
This paper focuses on using virtualization in an embedded context where latency matters, such as engine control units. The author wants to consolidate more functions on fewer chips. Goals of this design are portability, support for legacy OS's, lat...
[arXiv](https://arxiv.org/abs/2009.06789)
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
(taviso.decsystem.org)