Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware virtualization
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system