UMLinux - A Versatile SWIFI Tool
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
A Case For Grid Computing On Virtual Machines
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A tutoring system for IT security
Security education and critical infrastructures
Tele-lab IT security: an architecture for interactive lessons for security education
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Journal of Network and Systems Management
Proceedings of the 2004 Asia and South Pacific Design Automation Conference
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
A real-time information warfare exercise on a virtual network
Proceedings of the 36th SIGCSE technical symposium on Computer science education
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
HyperSpector: virtual distributed monitoring environments for secure intrusion detection
Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments
DGMonitor: A Performance Monitoring Tool for Sandbox-Based Desktop Grid Platforms
The Journal of Supercomputing
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Virtualised computing infrastructure
BT Technology Journal
Detecting past and present intrusions through vulnerability-specific predicates
Proceedings of the twentieth ACM symposium on Operating systems principles
Using VMM-based sensors to monitor honeypots
Proceedings of the 2nd international conference on Virtual execution environments
A feather-weight virtual machine for windows applications
Proceedings of the 2nd international conference on Virtual execution environments
Proceedings of the 43rd annual Design Automation Conference
Getting more from your virtual machine
Journal of Computing Sciences in Colleges
Root-kits & loadable kernel modules: exploiting the Linux kernel for fun and (educational) profit
Journal of Computing Sciences in Colleges
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems
NetHost-sensor: Monitoring a target host's application via system calls
Information Security Tech. Report
Protecting host-based intrusion detectors through virtual machines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Experiences with node virtualization for scalable network emulation
Computer Communications
SecureBus: towards application-transparent trusted computing with mandatory access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Resource management architecture for future information appliances
Journal of Embedded Computing - Real-Time and Embedded Computing Systems
Simulating mobile ad hoc networks in city scenarios
Computer Communications
Extending ACID semantics to the file system
ACM Transactions on Storage (TOS)
Operating system support for virtual machines
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Debugging operating systems with time-traveling virtual machines
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Xen and the art of repeated research
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Running BSD kernels as user processes by partial emulation and rewriting of machine instructions
BSDC'03 Proceedings of the BSD Conference 2003 on BSD Conference
Development tools for distributed applications
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Constructing services with interposable virtual hardware
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Towards virtual networks for virtual machine grid computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
ALS '01 Proceedings of the 5th annual Linux Showcase & Conference - Volume 5
Rapid file system development using ptrace
Proceedings of the 2007 workshop on Experimental computer science
Rapid file system development using ptrace
ecs'07 Experimental computer science on Experimental computer science
Dynamic security domain scaling on symmetric multiprocessors for future high-end embedded systems
CODES+ISSS '07 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis
Virtual machine time travel using continuous data protection and checkpointing
ACM SIGOPS Operating Systems Review
30 seconds is not enough!: a study of operating system timer usage
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Journal of Computing Sciences in Colleges
Journal of Computing Sciences in Colleges
Processor virtualization for secure mobile terminals
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Autonomous learning for efficient resource utilization of dynamic VM migration
Proceedings of the 22nd annual international conference on Supercomputing
Practical techniques for purging deleted data using liveness information
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
A Trusted Group Signature Architecture in Virtual Computing Environment
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Architecting Dependable and Secure Systems Using Virtualization
Architecting Dependable Systems V
Expanding Malware Defense by Securing Software Installations
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Efficiently tracking application interactions using lightweight virtualization
Proceedings of the 1st ACM workshop on Virtual machine security
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals
ACM Transactions on Embedded Computing Systems (TECS)
Dynamic security domain scaling on embedded symmetric multiprocessors
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Operating System Support for Space Allocation in Grid Storage Systems
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
Fast networking with socket-outsourcing in hosted virtual machine environments
Proceedings of the 2009 ACM symposium on Applied Computing
Network virtualization architecture: proposal and initial prototype
Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures
XLCMS: a scalable and distributive Linux virtual cluster management system
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
Constructing trusted virtual execution environment in P2P grids
Future Generation Computer Systems
Deployment of virtual machines in lock-keeper
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A secure virtual execution environment for untrusted code
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Mesovirtualization: lightweight virtualization technique for embedded systems
SEUS'07 Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
A novel approach for untrusted code execution
ICICS'07 Proceedings of the 9th international conference on Information and communications security
A model-driven emulation approach to large-scale TCP performance evaluation
International Journal of Communication Networks and Distributed Systems
A low-cost runtime-privilege changing system for shared servers
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests
ACM SIGOPS Operating Systems Review
The Heisenberg measuring uncertainty in lightweight virtualization testbeds
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Rump file systems: kernel code reborn
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Lightweight emulation to study peer-to-peer systems
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
IP over P2P: enabling self-configuring virtual IP networks for grid computing
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Executing MPI programs on virtual machines in an internet sharing system
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
The VMware mobile virtualization platform: is that a hypervisor in your pocket?
ACM SIGOPS Operating Systems Review
Virtualizing system and ordinary services in Windows-based OS-level virtual machines
Proceedings of the 2011 ACM Symposium on Applied Computing
A large-scale real-time network simulation study using prime
Winter Simulation Conference
Simulating mobile ad-hoc networks in city scenarios
WWIC'06 Proceedings of the 4th international conference on Wired/Wireless Internet Communications
Exception handling in the choices operating system
Advanced Topics in Exception Handling Techniques
Deployment of grid gateways using virtual machines
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Application-specific thread schedulers for internet server applications
Concurrency and Computation: Practice & Experience
Model-driven network emulation with virtual time machine
Proceedings of the Winter Simulation Conference
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
The Linux kernel has been ported so that it runs on itself, in a set of Linux processes. The result is a user space virtual machine using simulated hardware constructed from services provided by the host kernel. A Linux virtual machine is capable of running nearly all of the applications and services available on the host architecture. This paper describes the capabilities of a user-mode virtual machine, the design and implementation of the port, some of the applications that it lends itself to, and some of the work that remains to be done.