Search results for "Virtual machine"
showing 3 items of 83 documents
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
STATBOX Concept for Simulation of Urban Phenomena
2013
Abstract An urban environment is a dynamic system which is constantly changing in terms of space and time. There are two dimensions in any urban environment – the physical dimension and the functional dimension. All of the structures of an urban environment interact and people are the intermediaries in this process. The spatial structure of cities has been studied from various perspectives by architects, urban planners, environmental scientists, economists, geographers etc. Constant monitoring that is based on remote sensing, spatial statistics, simulation etc., is needed to make on going note of transformation in the various types of land use that exist, movement of people and business env…
Efficient remote authentication
2013
In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. peerReviewed