Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

operating system service virtualization

biblio

Visible to the public Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions

Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
  • security
  • operating system service virtualization
  • Policy
  • policy-based governance
  • process maliciousness
  • process virtual machine
  • program flow control
  • pubcrawl
  • sandbox
  • sandboxing
  • operating system kernels
  • system call virtualization
  • untrusted application behaviour control
  • untrusted application behaviour monitoring
  • virtual machine equivalent isolation
  • virtual machines
  • Virtual machining
  • virtualisation
  • Virtualization
  • hardware virtualization extensions
  • composability
  • confined malicious application
  • execution overheads
  • file system access
  • Governance
  • Government
  • Hardware
  • Hardware virtualization
  • code vulnerabilities
  • isolation
  • Kernel
  • kernel operating system
  • Libraries
  • Linux
  • Linux process
  • Memory management
  • operating system

Terms of Use  |  ©2023. CPS-VO