Modern applications comprise multiple components, such as browser plug-ins, often of unknown provenance and quality. Statistics show that failure of such components accounts for a high percentage of software faults. Enabling isolation of such fine-grained components is therefore necessary to increase the robustness and resilience of security-critical and safety-critical computer systems.\ud In this paper, we evaluate whether such fine-grained components can be sandboxed through the use of the hardware virtualization support available in modern Intel and AMD processors. We compare the performance and functionality of such an approach to two previous software based approaches. The results demonstrate that hardware isolation minimizes the diff...
A promising approach for designing critical embedded systems is based on virtualization technologies...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
Modern applications comprise multiple components, such as browser plug-ins, often of unknown provena...
Abstract—Network has been widely applied in all aspects of life with time. Spread of malicious progr...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Virtual machines have been used since the 1960’s in creative ways. From multiplexing expensive mainf...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Computer security aims at protecting confidentiality, in-tegrity, and availability of sensitive info...
While security has become important in embedded systems, commodity operating systems often fail in e...
While security has become important in embedded systems, commodity operating systems often fail in e...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
A promising approach for designing critical embedded systems is based on virtualization technologies...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
Modern applications comprise multiple components, such as browser plug-ins, often of unknown provena...
Abstract—Network has been widely applied in all aspects of life with time. Spread of malicious progr...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Virtual machines have been used since the 1960’s in creative ways. From multiplexing expensive mainf...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Computer security aims at protecting confidentiality, in-tegrity, and availability of sensitive info...
While security has become important in embedded systems, commodity operating systems often fail in e...
While security has become important in embedded systems, commodity operating systems often fail in e...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
A promising approach for designing critical embedded systems is based on virtualization technologies...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...