Essays about: "Hypervisor"
Showing result 21 - 25 of 40 essays containing the word Hypervisor.
-
21. Strict separation between OS and USB driver using a hypervisor
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : During 2014, an attack called the BadUSB attack surfaced. This attack allows the attacker to reflash the firmware of a USB devices and make it perform malicious tasks. READ MORE
-
22. Mitigation of Virtunoid Attacks on Cloud Computing Systems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtualisation control program QEMU-KVM. The vulnerability originally stems from improper hotplugging of emulated embedded circuitry in the Intel PIIX4 southbridge resulting in memory corruption and dangling pointers. READ MORE
-
23. Performance analysis of TCP in KVM virtualized environment
University essay from Blekinge Tekniska Högskola/Institutionen för kommunikationssystemAbstract : The requirement of high quality services is increasing day by day. So, in order to meet up with this requirement new technologies are being developed one of them being virtualization. READ MORE
-
24. Performance evaluation of Linux Bridge and OVS in Xen
University essay from Blekinge Tekniska HögskolaAbstract : Virtualization is the key technology which has provided smarter and easier ways for effectively utilizing resources provided by the hypervisor. Virtualization allows multiple operative systems (OS) to run on a single hardware. The resources from a hardware are allocated to virtual machines (VM) by hypervisor. READ MORE
-
25. Resource based analysis of Ethernet communication between software partitions
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : Nowadays, Industrial Control Systems (ICSs) are becoming larger and implement more complex functions. Therefore, technologies that are currently used to implement these functions, like hardware platforms and communication protocols might soon become unusable due to the lack of resources. READ MORE