This paper outlines the design of `Quest-V', which is implemented as a collection of separate kernels operating together as a distributed system on a chip. Quest-V uses virtualization techniques to isolate kernels and prevent local faults from affecting remote kernels. This leads to a high-confidence multikernel approach, where failures of system subcomponents do not render the entire system inoperable. A virtual machine monitor for each kernel keeps track of shadow page table mappings that control immutable memory access capabilities. This ensures a level of security and fault tolerance in situations where a service in one kernel fails, or is corrupted by a malicious attack. Communication is supported between kernels using shared memory r...
Abstract. Large-scale computing platforms provide tremendous capabilities for scientific discovery. ...
Virtualization has provided a vehicle for people to gain flexibility and security in utilizing compu...
In many instances of virtual machine deployments today, virtual machine instances are created to sup...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
Abstract—Multi- and many-core processors are becom-ing increasingly popular in embedded systems. Man...
This paper presents different approaches for real-time fault tolerance using redundancy methods for ...
Software complexity in embedded systems is continuously increasing while embedded computing platform...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Quest-V is a system we have been developing from the ground up, with objectives focusing on safety, ...
In this paper we describe our approach to improve dependability of a commodity OS for embedded syste...
Abstract—Quest-V is a separation kernel, which parti-tions a system into a collection of sandboxes. ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Virtualization is increasingly being used in regular desktop PCs, data centers and server farms. One...
Abstract. Large-scale computing platforms provide tremendous capabilities for scientific discovery. ...
Virtualization has provided a vehicle for people to gain flexibility and security in utilizing compu...
In many instances of virtual machine deployments today, virtual machine instances are created to sup...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
Abstract—Multi- and many-core processors are becom-ing increasingly popular in embedded systems. Man...
This paper presents different approaches for real-time fault tolerance using redundancy methods for ...
Software complexity in embedded systems is continuously increasing while embedded computing platform...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Quest-V is a system we have been developing from the ground up, with objectives focusing on safety, ...
In this paper we describe our approach to improve dependability of a commodity OS for embedded syste...
Abstract—Quest-V is a separation kernel, which parti-tions a system into a collection of sandboxes. ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Virtualization is increasingly being used in regular desktop PCs, data centers and server farms. One...
Abstract. Large-scale computing platforms provide tremendous capabilities for scientific discovery. ...
Virtualization has provided a vehicle for people to gain flexibility and security in utilizing compu...
In many instances of virtual machine deployments today, virtual machine instances are created to sup...