Secure in-VM monitoring using hardware virtualization.
Monirul I. SharifWenke LeeWeidong CuiAndrea LanziPublished in: CCS (2009)
Keyphrases
- virtual machine
- application level
- real time
- operating system
- virtual machine monitor
- ibm zenterprise
- monitoring system
- low cost
- hardware and software
- data acquisition
- distributed computing
- data center
- computer systems
- cloud computing
- hardware implementation
- input output
- security issues
- resource utilization
- lightweight
- trusted computing
- protection scheme
- image processing
- field programmable gate array
- security mechanisms
- security requirements
- computing systems
- personal computer