Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hypervisor security
biblio
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities
Submitted by grigby1 on Fri, 01/13/2023 - 11:51am
Cloud Computing
pubcrawl
resilience
Resiliency
Hardware
Scalability
privacy
Industries
Production
Virtual machine monitors
Security by Default
Epidemics
hypervisor security
secret-free
security-in-depth
speculative vulnerabilities
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
biblio
Organization of the Entrusted Calculations in Crucial Objects of Informatization under Uncertainty
Submitted by grigby1 on Tue, 02/06/2018 - 12:59pm
Prototypes
trusted platform modules
Trusted Platform Module
Trusted Computing
TPM technology (Trusted Platform Module)
tpm
the prevention of activation of not declared opportunities
the entrusted domestic environment of calculations
safe calculations
root of trust
Resiliency
Registers
pubcrawl
composability
Organizations
informatization
hypervisor security
Hardware
entrusted calculations
encoding
domestic electronic base
Cryptography
crucial objects
control of complex objects under uncertainty
Computers
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework
biblio
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design
Submitted by BrandonB on Thu, 04/30/2015 - 1:09pm
microkernel architectures
XEN
virtualization platform
virtualisation
Virtual machining
Virtual machine monitors
security tradeoffs
security of data
security
secure hyper visor design
networking
monolithic hyper visor architectures
monolithic architectures
monolithic architecture
monitoring interface
Monitoring
application program interfaces
microkernel architecture
micro kernel hyper visor architectures
micro architecture
management API
Kernel
hypervisor security
Hyper-V
hyper visor security
hyper calls
Hardware
ESXi
computer architecture
Cloud Computing
attack surface