Virtual ghost: protecting applications from hostile operating systems.
John CriswellNathan DautenhahnVikram S. AdvePublished in: ASPLOS (2014)
Keyphrases
- operating system
- computer systems
- windows xp
- microsoft windows
- distributed systems
- virtual machine
- linux kernel
- access control
- information systems
- address space
- virtual memory
- application programs
- application level
- memory management
- information security
- distributed databases
- operating environment
- object oriented
- data model
- machine learning
- multi tasking