A recursive virtual machine architecture
Proceedings of the workshop on virtual computer systems
Virtualizing the VAX architecture
ISCA '91 Proceedings of the 18th annual international symposium on Computer architecture
A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
A structural computer system resource model for teaching computer organization
SIGCSE '85 Proceedings of the sixteenth SIGCSE technical symposium on Computer science education
VM/4: ACOS-4 virtual machine architecture
ISCA '85 Proceedings of the 12th annual international symposium on Computer architecture
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
A model for and discussion of multi-interpreter systems
Communications of the ACM
Review of Introduction to computer architecture by Harld S. Stone.
ACM SIGARCH Computer Architecture News
Application of the military computer family architecture selection criteria to the PR1ME P400
ACM SIGARCH Computer Architecture News
Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
ACM '76 Proceedings of the 1976 annual conference
Sharing data and services in a virtual machine system
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Formal properties of recursive Virtual Machine architectures.
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The PDP-11 virtual machine architecture: A case study
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Hardware architecture for recursive Virtual Machines
ACM '75 Proceedings of the 1975 annual conference
Proceedings of the 4th ACM workshop on Digital rights management
Interprocess communication system of the MT35 digital exchange
SIGCOMM '83 Proceedings of the symposium on Communications Architectures & Protocols
Friendly virtual machines: leveraging a feedback-control model for application adaptation
Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments
A comparison of software and hardware techniques for x86 virtualization
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
Protecting host-based intrusion detectors through virtual machines
Computer Networks: The International Journal of Computer and Telecommunications Networking
System management software for virtual environments
Proceedings of the 4th international conference on Computing frontiers
Itanium: a system implementor's tale
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Performance and security lessons learned from virtualizing the alpha processor
Proceedings of the 34th annual international symposium on Computer architecture
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
vBlades: optimized paravirtualization for the Itanium processor family
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
A critique of the GNU hurd multi-server operating system
ACM SIGOPS Operating Systems Review
Evaluating the Performance Impact of Xen on MPI and Process Execution For HPC Systems
VTDC '06 Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing
An independent audit framework for software dependent voting systems
Proceedings of the 14th ACM conference on Computer and communications security
Jones optimality and hardware virtualization: a report on work in progress
PEPM '08 Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Accelerating two-dimensional page walks for virtualized systems
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Queue - Virtualization
Queue - Virtualization
Transparent checkpoint-restart of multiple processes on commodity operating systems
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Remote detection of virtual machine monitors with fuzzy benchmarking
ACM SIGOPS Operating Systems Review
Software debugging: the virtual machine approach
ACM '74 Proceedings of the 1974 annual ACM conference - Volume 2
Encapsulation: an approach to operating system security
ACM '74 Proceedings of the 1974 annual ACM conference - Volume 2
Active semantically aware hard real-time security hypervisors
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
A Trusted Group Signature Architecture in Virtual Computing Environment
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Liberate Computer User from Programming
AMAST 2008 Proceedings of the 12th international conference on Algebraic Methodology and Software Technology
Proceedings of the 2nd workshop on System-level virtualization for high performance computing
Alternatives for scheduling virtual machines in real-time embedded systems
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Virtual machines for distributed real-time systems
Computer Standards & Interfaces
Initial selection and screening of the CFA candidate computer architectures
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
Verifiable secure operating system software
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Analysis of virtual machine system policies
Proceedings of the 14th ACM symposium on Access control models and technologies
Virtualized recomposition: Cloudy or clear?
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
MobiVMM: a virtual machine monitor for mobile phones
Proceedings of the First Workshop on Virtualization in Mobile Computing
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Virtualizing high-performance graphics cards for driver design and development
CASCON '09 Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research
Quantitative analysis and systematic parametrization of a two-level real-time scheduler
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
SIGMA System: A Multi-OS Environment for Embedded Systems
Journal of Signal Processing Systems
Constructing trusted virtual execution environment in P2P grids
Future Generation Computer Systems
A study on asymmetric operating systems on symmetric multiprocessors
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Virtual disk monitor based on multi-core EFI
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
Plugging the hypervisor abstraction leaks caused by virtual networking
Proceedings of the 3rd Annual Haifa Experimental Systems Conference
Operating system virtualization: practice and experience
Proceedings of the 3rd Annual Haifa Experimental Systems Conference
Testing system virtual machines
Proceedings of the 19th international symposium on Software testing and analysis
Compilation and virtualization in the HiPEAC vision
Proceedings of the 47th Design Automation Conference
The reservoir model and architecture for open federated cloud computing
IBM Journal of Research and Development
The OKL4 microvisor: convergence point of microkernels and hypervisors
Proceedings of the first ACM asia-pacific workshop on Workshop on systems
Cluster-wide context switch of virtualized jobs
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Non-intrusive virtualization management using libvirt
Proceedings of the Conference on Design, Automation and Test in Europe
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Virtual environment security modeling
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
The evolution of an x86 virtual machine monitor
ACM SIGOPS Operating Systems Review
A framework for testing hardware-software security architectures
Proceedings of the 26th Annual Computer Security Applications Conference
The turtles project: design and implementation of nested virtualization
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Formally efficient program instrumentation
RV'10 Proceedings of the First international conference on Runtime verification
Teaching operating systems as how computers work
Proceedings of the 42nd ACM technical symposium on Computer science education
Ensuring portability of software
Programming and Computing Software
SplitX: split guest/hypervisor execution on multi-core
WIOV'11 Proceedings of the 3rd conference on I/O virtualization
A lightweight virtual machine monitor for security analysis on Intel64 architecture
Journal of Computing Sciences in Colleges
L4Android: a generic operating system framework for secure smartphones
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
The performance analysis for virtualisation cluster and cloud platforms
International Journal of Computational Science and Engineering
Architectural characterization of VM scaling on an SMP machine
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Paravirtualization for HPC systems
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Power-aware scheduler for virtualized systems
Green Computing Middleware on Proceedings of the 2nd International Workshop
Linux/RTOS hybrid operating environment on gandalf virtual machine monitor
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Trusted deployment of virtual execution environment in grid systems
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
ELI: bare-metal performance for I/O virtualization
ASPLOS XVII Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems
Replacement attacks against VM-protected applications
VEE '12 Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments
acTvSM: a dynamic virtualization platform for enforcement of application integrity
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Predicting disk scheduling performance with virtual machines
PERFORM'10 Proceedings of the 2010 IFIP WG 6.3/7.3 international conference on Performance Evaluation of Computer and Communication Systems: milestones and future challenges
Virtualizing performance counters
Euro-Par'11 Proceedings of the 2011 international conference on Parallel Processing
Virtualized HPC: a contradiction in terms?
Software—Practice & Experience
Extended scheduler for efficient frequency scaling in virtualized systems
ACM SIGOPS Operating Systems Review
Configurable fine-grain protection for multicore processor virtualization
Proceedings of the 39th Annual International Symposium on Computer Architecture
Identifying critical factors for corporate implementing virtualization technology
Computers in Human Behavior
Reliable device sharing mechanisms for Dual-OS embedded trusted computing
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Trustworthy execution on mobile devices: what security properties can my mobile platform give me?
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Bringing Virtualization to the x86 Architecture with the Original VMware Workstation
ACM Transactions on Computer Systems (TOCS)
The use of hardware virtualization in the context of information security
Programming and Computing Software
ISC'07 Proceedings of the 10th international conference on Information Security
Software protection for dynamically-generated code
PPREW '13 Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop
A test case generation technique for VMM fuzzing
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Formal virtualization requirements for the ARM architecture
Journal of Systems Architecture: the EUROMICRO Journal
Improving virtualization in the presence of software managed translation lookaside buffers
Proceedings of the 40th Annual International Symposium on Computer Architecture
VMM detection using privilege rings and benchmark execution times
International Journal of Communication Networks and Distributed Systems
Virtual Machine Allocation in Cloud Computing Environment
International Journal of Cloud Applications and Computing
Black box scheduling for resource intensive virtual machine workloads with interference models
Future Generation Computer Systems
KVM/ARM: the design and implementation of the linux ARM hypervisor
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems
Hi-index | 48.24 |
Virtual machine systems have been implemented on a limited number of third generation computer systems, e.g. CP-67 on the IBM 360/67. From previous empirical studies, it is known that certain third generation computer systems, e.g. the DEC PDP-10, cannot support a virtual machine system. In this paper, model of a third-generation-like computer system is developed. Formal techniques are used to derive precise sufficient conditions to test whether such an architecture can support virtual machines.