BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (4)
protect (3)
time (3)
verif (3)
driver (3)

Stem hypervisor$ (all stems)

21 papers:

DACDAC-2015-BeckertE #design #independence #realtime
Designing time partitions for real-time hypervisor with sufficient temporal independence (MB, RE), p. 6.
HPCAHPCA-2015-JinPSCSZ #fault #hardware #named
FTXen: Making hypervisor resilient to hardware faults on relaxed cores (XJ, SP, TS, RC, ZS, YZ), pp. 451–462.
DACDAC-2014-BeckertNEP #independence #realtime
Sufficient Temporal Independence and Improved Interrupt Latencies in a Real-Time Hypervisor (MB, MN, RE, SMP), p. 6.
ASPLOSASPLOS-2014-DallN #design #implementation #linux #named
KVM/ARM: the design and implementation of the linux ARM hypervisor (CD, JN), pp. 333–348.
TAPTAP-2014-KosmatovLA #case study #proving #testing #verification
A Case Study on Verification of a Cloud Hypervisor by Proof and Structural Testing (NK, ML, CA), pp. 158–164.
HPCAHPCA-2013-XiaLC #architecture #physics #virtual machine
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
SEFMSEFM-2012-PaulSS #assembly #automation #verification
Completing the Automated Verification of a Small Hypervisor — Assembler Code Verification (WJP, SS, AS), pp. 188–202.
SACSAC-2012-HuaS #kernel #lightweight #memory management #named
Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation (JH, KS), pp. 1470–1477.
SACSAC-2012-OmoteCSKEM #encryption
Hypervisor-based background encryption (YO, YC, TS, TK, HE, KM), pp. 1829–1836.
SACSAC-2012-OyamaGCSK #detection
Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
SACSAC-2012-WangYLQG
Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
ASPLOSASPLOS-2012-SzeferL #architecture
Architectural support for hypervisor-secure virtualization (JS, RBL), pp. 437–450.
SOSPSOSP-2011-ColpNZACDLW #security
Breaking up is hard to do: security and functionality in a commodity hypervisor (PC, MN, JZ, WA, GC, TD, PL, AW), pp. 189–202.
DACDAC-2010-Fornaeus
Device hypervisors (JF), pp. 114–119.
SACSAC-2010-ChubachiSK #persistent
Hypervisor-based prevention of persistent rootkits (YC, TS, KK), pp. 214–220.
OSDIOSDI-2010-GulatiMV #named #scheduling #throughput #variability
mClock: Handling Throughput Variability for Hypervisor IO Scheduling (AG, AM, PJV), pp. 437–450.
FMFM-2009-LeinenbachS #verification
Verifying the Microsoft Hyper-V Hypervisor with VCC (DL, TS), pp. 806–809.
ASPLOSASPLOS-2009-MenonSZ #automation #named #network #performance
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers (AM, SS, WZ), pp. 301–312.
SOSPSOSP-2007-SeshadriLQP #kernel #named
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes (AS, ML, NQ, AP), pp. 335–350.
FMFM-2006-Cohen #validation
Validating the Microsoft Hypervisor (EC), p. 81.
SOSPSOSP-1995-BressoudS #fault tolerance
Hypervisor-based Fault-tolerance (TCB, FBS), pp. 1–11.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.