Using hypervisor to provide data secrecy for user applications on a per-page basis
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Low-bandwidth VM migration via opportunistic replay
Proceedings of the 9th workshop on Mobile computing systems and applications
Virtualization as an enabler for security in mobile devices
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Experimenting in mobile social contexts using JellyNets
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
VStore: efficiently storing virtualized state across mobile devices
Proceedings of the First Workshop on Virtualization in Mobile Computing
MobiVMM: a virtual machine monitor for mobile phones
Proceedings of the First Workshop on Virtualization in Mobile Computing
Virtualized in-cloud security services for mobile devices
Proceedings of the First Workshop on Virtualization in Mobile Computing
A step to support real-time in virtual machine
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Rootkits on smart phones: attacks, implications and opportunities
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
PRISM: platform for remote sensing using smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
Dynamic Migration of Computation Through Virtualization of the Mobile Platform
Mobile Networks and Applications
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Vision: mClouds - computing on clouds of mobile devices
Proceedings of the third ACM workshop on Mobile cloud computing and services
Towards synchronization of live virtual machines among mobile devices
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
WebCallerID: Leveraging cellular networks for Web authentication
Journal of Computer Security
Hi-index | 0.00 |
In this position paper, we explore the opportunities and challenges of running pocket hypervisors on commodity mobile devices through four proposed applications: secure operating systems, security services, mobile testbeds, and opportunistic sensor networks. We believe that pocket hypervisors can benefit mobile computing, but that mobility presents several important and unique challenges to virtualization.