The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization has been widely used as a key technology in cloud computing. Although facilitating the deployment of applications, virtualization introduces huge processing overheads, among which is network I/O virtualization that has become a critical bottleneck of a virtual system. DPDK-vhost is currently the fastest para-virtualized network I/O backend, however it performs poorly when exchanging...
Reducing energy consumption is part of the main concerns in cloud and HPC environments. Today servers energy consumption is far from ideal, mostly because it remains very high even with low usage state. An energy consumption proportional to the server load would bring important savings in terms of electricity consumption and then financial costs for a data enter infrastructure. In this paper, we propose...
To evade VM-based malware analysis systems, VM-aware malware equipped with the ability to detect the presence of virtual machine has appeared. To cope with the problem, detecting VM-aware malware and locating VM-sensitive divergence points of VM-aware malware is in urgent need. In this paper, we propose a novel block-based divergence locator. In contrast to the conventional instruction-based schemes,...
Cloud computing is a new trend based on virtualization. It motivates many academic institutions and non-academic to move towards this approach. Our goal is to enhance the security of the cloud computing through virtualization and more precisely by the principle of the fork of the virtual machine. This article describes the proposed solution to achieve this goal and discusses the choice of tools that...
It is difficult to analyze and debug Cisco IOS with traditional debugging and disassembler tools such as GDB and IDA pro. These tools can't debug Cisco IOS in single step mode. This paper describes a dynamic analysis system based on a modification hardware emulator called Dynamips. Then, a new solution of inserting breakpoint with network events will be provided to analyze network communication procedures.
With benefits of Cloud Computing widely acknowledged more and more public and private Cloud deployed. Virtualization is one of the most important supporting technologies for Cloud. While main stream CPUs are marching to many-core architecture the performance improvement of virtualization on many-core processor platform is critical for future Cloud. This paper presents an approach to implement network...
Co-designed Virtual Machine (Co-VM) technique combining software and hardware enables a different approach to microprocessor design, where the host architecture is designed concurrently with the software that runs on it. The key of a Co-VM is to emulate the source architecture on the target architecture through interpretation and binary translation. There is some commonness of different Co-VMs. In...
A new single system image (SSI) system is implemented in order to simplify the complexity of management and programming of clusters. Resource in clusters is integrated by the combination of virtualization and distributed shared memory (DSM), and a single physical machine abstract is achieved for the guest operating system as a result of single system image. The prototype system proves the feasibility...
As the continuous employment of the state-of-the-art technology such as polymorphism, metamorphism used by malware to avoid the anti-virus detection systems, virtual machine which forces malware converting into its original form by executing it in a virtual environment has played an increasingly important role in malware detection system. In this paper, we introduce all types of virtual machines and...
Numerous approaches have been investigated to achieve single system image in order to simplify the complexity of programming and administration of cluster. This paper focuses on virtualization approach and presents NEX, a system of cooperative hypervisors with single system image support. NEX could provide a virtual SMP machine over cluster nodes. Commodity operating systems that support SMP could...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.