Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confined malicious application
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system