Essays about: "Hypervisor"

Showing result 11 - 15 of 40 essays containing the word Hypervisor.

  1. 11. Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : David Hjerpe; Henrik Bengtsson; [2018]
    Keywords : Memory forensics; Virtual Machine Introspection; Cloud computing; KVM; QEMU;

    Abstract : Infrastructure as a Service and memory forensics are two subjects which have recently gained increasing amounts of attention. Combining these topics poses new challenges when performing forensic investigations. READ MORE

  2. 12. Safety-critical Control in MixedCriticality Embedded Systems : A Study on Mixed Criticality in the AutomotiveIndustry

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : EMIL HJELM; [2017]
    Keywords : ;

    Abstract : Modern automotive systems contain a large number of Electronic Control Units, each controlling a specific system of a specific criticality level. To increase efficiency it is desired to combine multiple applications into fewer ECUs, leading to mixed criticality embedded systems. READ MORE

  3. 13. Comparing Live Migration between Linux Containers and Kernel Virtual Machine : Investigation study in terms of parameters

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sai Venkat Naresh Kotikalapudi; [2017]
    Keywords : Virtualization; Live migration; hypervisor; container; KVM; LXC;

    Abstract : Context. Virtualization technologies have been extensively used in various cloud platforms. Hardware replacements and maintenance are occasionally required, which leads to business downtime. Live migration is performed to ensure high availability of services, as it is a major aspect. READ MORE

  4. 14. Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Anton Sundblad; Gustaf Brunberg; [2017]
    Keywords : tee; information security; hypervisor; attack trees; fault trees;

    Abstract : Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. READ MORE

  5. 15. Comparative evaluation of virtualization technologies in the cloud

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Marcus Johansson; Lukas Olsson; [2017]
    Keywords : ;

    Abstract : The cloud has over the years become a staple of the IT industry, not only for storage purposes, but for services, platforms and infrastructures. A key component of the cloud is virtualization and the fluidity it makes possible, allowing resources to be utilized more efficiently and services to be relocated more easily when needed. READ MORE