Abstract—Virtualization has been widely adopted in recent years in the cloud computing platform to improve server con-solidation and reduce operating cost. Virtual Machine (VM) checkpointing refers to the act of saving a persistent snapshot (or checkpoint) of a VM’s state at any instant. VM checkpointing can drastically prolong the lifetime and vulnerability of confidential or private user data in applications that execute within VMs. Simply encrypting the checkpoint does not reduce the lifetime of confidential data that should be quickly discarded after its use. In this paper, we present an application-level approach, called Privacy-preserving Checkpointing (PPC), which excludes confidential data from VM checkpoints, instead of encrypting ...
This paper analyzes the usage data from a live deployment of an enterprise client management system ...
Transparent hypervisor-level checkpoint-restart mechanisms for virtual clusters (VCs) or clusters of...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Checkpointing, i.e., recording the volatile state of a virtual machine (VM) running as a guest in a ...
Benefits have been claimed by adopting virtualization techniques in many fields. It could significan...
The success of cloud computing leads to large, centralized collections of virtual machine (VM) image...
International audienceInfrastructure-as-a-Service (IaaS) cloud computing is gaining significant inte...
Abstract. Systems running commodity software are easily compromised with malware, which may be used ...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Abstract- In this work, we present the design of the Checkpointing-Enabled Virtual Machine (CEVM) ar...
Abstract—Virtual machine security issues have been the focus of attention. The permissions of tradit...
The cloud computing concept has significantly influenced how information is delivered and managed in...
Malware detection and analysis is a major part of computer security. There is an arm race between se...
Abstract—To improve the user's experience, almost all applications save usage data: web browser...
Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system....
This paper analyzes the usage data from a live deployment of an enterprise client management system ...
Transparent hypervisor-level checkpoint-restart mechanisms for virtual clusters (VCs) or clusters of...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Checkpointing, i.e., recording the volatile state of a virtual machine (VM) running as a guest in a ...
Benefits have been claimed by adopting virtualization techniques in many fields. It could significan...
The success of cloud computing leads to large, centralized collections of virtual machine (VM) image...
International audienceInfrastructure-as-a-Service (IaaS) cloud computing is gaining significant inte...
Abstract. Systems running commodity software are easily compromised with malware, which may be used ...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Abstract- In this work, we present the design of the Checkpointing-Enabled Virtual Machine (CEVM) ar...
Abstract—Virtual machine security issues have been the focus of attention. The permissions of tradit...
The cloud computing concept has significantly influenced how information is delivered and managed in...
Malware detection and analysis is a major part of computer security. There is an arm race between se...
Abstract—To improve the user's experience, almost all applications save usage data: web browser...
Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system....
This paper analyzes the usage data from a live deployment of an enterprise client management system ...
Transparent hypervisor-level checkpoint-restart mechanisms for virtual clusters (VCs) or clusters of...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...