1 - 4 of 4 Chapters
[In this chapter we will discuss what micro-hypervisors are and why they are important. We will present a discussion on competing system architectures and delineate the capabilities and importance of micro-hypervisors.]
[We analyze the feasibility of constructing an integrity-protected micro-hypervisor on contemporary x86 and ARM hardware that includes virtualization support, observing that without the fundamental property of micro-hypervisor integrity, no additional properties (e.g., secrecy, information-flow,...
[This chapter presents the uber eXtensible Micro-Hypervisor Framework (uberXMHF), a micro-hypervisor architecture and framework that focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows)...
[This chapter showcases several micro-hypervisor-based applications (“uberapps”) that employ uberXMHF. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.