Search results for "virtualisointi"

showing 10 items of 25 documents

Containers in Software Development: A Systematic Mapping Study

2019

Over the past decade, continuous software development has become a common place in the field of software engineering. Containers like Docker are a lightweight solution that developers can use to deploy and manage applications. Containers are used to build both component-based architectures and microservice architectures. Still, practitioners often view containers only as way to lower resource requirements compared to virtual machines. In this paper, we conducted a systematic mapping study to find information on what is known of how containers are used in software development. 56 primary studies were selected into this paper and they were categorized and mapped to identify the gaps in the cu…

050101 languages & linguisticsvirtualisointiComputer scienceeducationohjelmistotuotantoCloud computingContext (language use)02 engineering and technologycomputer.software_genreField (computer science)Resource (project management)ohjelmistoarkkitehtuuriComponent (UML)0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesDevOpssystematic mapping studiesbusiness.industry05 social sciencesSoftware development113 Computer and information sciencesVirtual machinecontainers020201 artificial intelligence & image processingohjelmistokehitysbusinessSoftware engineeringcomputersoftware engineering
researchProduct

Towards Service-oriented 5G: Virtualizing the Networks for Everything-as-a-Service

2018

It is widely acknowledged that the forthcoming 5G architecture will be highly heterogeneous and deployed with a high degree of density. These changes over the current 4G bring many challenges on how to achieve an efficient operation from the network management perspective. In this article, we introduce a revolutionary vision of the future 5G wireless networks, in which the network is no longer limited by hardware or even software. Specifically, by the idea of virtualizing the wireless networks, which has recently gained increasing attention, we introduce the Everything-as-a-Service (XaaS) taxonomy to light the way towards designing the service-oriented wireless networks. The concepts, chall…

Big Datawireless networksNetworking and Internet Architecture (cs.NI)FOS: Computer and information sciencesvirtualisointisoftware5G-tekniikkawireless network virtualizationEverything-as-a-servicevirtualizationComputer Science - Networking and Internet Architecture5G technologyvirtualisation5G mobile communicationhardwarelcsh:Electrical engineering. Electronics. Nuclear engineeringeverything-as-a-servicecomputer architecturelcsh:TK1-99715Glangattomat verkot
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Cargo-Cult Containerization : A Critical View of Containers in Modern Software Development

2022

Software is increasingly developed and deployed using containers. While the concept of a container is conceptually straightforward, there are various issues to be considered while using them, ranging from technical details inside containers to the orchestration of containers that jointly form a meaningful application. In recent years, the use of containers has become so prevalent that developers have a tendency to resort to cargo-cult containerization - ritual adherence to the use of containers just because so many others are doing the same thing. In this paper, we study advantages and downsides of containers in modern-day software development. We foresee the use of containers to spread int…

DevOpsdesign principlesvirtualisointicontainer orchestrationcontainerizationsoftware containersohjelmistotuotanto113 Computer and information sciencessoftware designohjelmistosuunnittelupilvipalvelutohjelmistoarkkitehtuuriohjelmistokehityscontinuous software engineering
researchProduct

Integrating Docker to a Continuous Delivery pipeline : a pragmatic approach

2016

Docker on kevyt avoimen alustan sovellus, joka pystyy pakkaamaan sovelluksen kaikkien tarvittavien riippuvuuksien kanssa yhteen konttiin, ja tätä teknologiaa kutsutaan konttiteknologiaksi. Oikein käytettynä IT-ammattilaiset voivat saada konttiteknologiasta merkittäviä hyötyjä, sillä näitä paketteja voidaan helposti rakentaa, lähettää ja ajaa hajautetuissa järjestelmissä. Dockerin nousu on hämmästyttävää, sillä siitä on tullut konttiteknologian standardi vain kolmessa vuodessa ja se toimii jo nativisti Windowsilla sekä Linuxilla. Tämä teknologia tarjoaa suuria mahdollisuuksia tulevaisuuden ohjelmistokehitykselle sekä käyttöönotolle tarjoamalla uudenlaisia tapoja siirrettävyyden, skaalautuvuu…

Dockerkonttiteknologiavirtualisointisovelluksetjatkuva toimitussovellukset (tietotekniikka)
researchProduct

H-KPP : Hypervisor-Assisted Kernel Patch Protection

2022

We present H-KPP, hypervisor-based protection for kernel code and data structures. H-KPP prevents the execution of unauthorized code in kernel mode. In addition, H-KPP protects certain object fields from malicious modifications. H-KPP can protect modern kernels equipped with BPF facilities and loadable kernel modules. H-KPP does not require modifying or recompiling the kernel. Unlike many other systems, H-KPP is based on a thin hypervisor and includes a novel SLAT switching mechanism, which allows H-KPP to achieve very low (≈6%) performance overhead compared to baseline Linux.

Fluid Flow and Transfer ProcessesSoftware_OPERATINGSYSTEMSvirtualisointiProcess Chemistry and TechnologyKernel IntegrityGeneral Engineeringvirtualization; Kernel Integrity; DKOMGeneral Materials SciencetietoturvaDKOMInstrumentationvirtualizationComputer Science Applications
researchProduct

Nanovised Control Flow Attestation

2022

This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the design and implementation of C-FLAT through the use of a type 2 Nanovisor in the Linux operating system. We call our improved system “C-FLAT Linux”. Compared to the original C-FLAT, C-FLAT Linux reduces processing overheads and is able to detect the SlowLoris attack. We describe the architecture of C-FLAT Linux and provide extensive measurements of its performance in benchmarks and real-world scenarios. In addition, we demonstrate the…

Fluid Flow and Transfer ProcessespääsynvalvontaSoftware_OPERATINGSYSTEMSvirtualisointiProcess Chemistry and TechnologyLinuxhypervisor; ARM; Linux; control flow; SlowLoris; TrustZoneSlowLorisGeneral EngineeringTrustZonecontrol flowComputer Science ApplicationsARMGeneral Materials SciencehypervisortietoturvaInstrumentationApplied Sciences; Volume 12; Issue 5; Pages: 2669
researchProduct

HyperIO: A Hypervisor-Based Framework for Secure IO

2023

Malware often attempts to steal input and output through human interface devices to obtain confidential information. We propose to use a thin hypervisor, called “HyperIO”, to realize a secure path between input and output devices using a partial implementation of device drivers. We apply our approach using two security systems built on HyperIO: FireSafe and ClipCrypt. FireSafe is a web browser extension which allows a remote web server to display and receive sensitive user information securely. ClipCrypt enables the user to securely enter and view their confidential information in commodity Windows applications.

Fluid Flow and Transfer ProcessesvirtualisointiProcess Chemistry and Technologytrusted pathGeneral Engineeringtrusted path; virtualization; system security; browser security; malware protectionvirtualizationComputer Science Applicationsbrowser securityhaittaohjelmatjärjestelmänhallintatietosuojamalware protectionsystem securityGeneral Materials SciencetietoturvatietoverkotInstrumentationtietojärjestelmätApplied Sciences
researchProduct

Virtual Resource Allocation for Wireless Virtualized Heterogeneous Network with Hybrid Energy Supply

2022

In this work, two novel virtual user association and resource allocation algorithms are introduced for a wireless virtualized heterogeneous network with hybrid energy supply. In the considered system, macro base stations (MBSs) are supplied by the grid power and small base stations (SBSs) have the energy harvesting capability in addition to the grid power supplement. Multiple infrastructure providers (InPs) own the physical resources, i.e., BSs and radio resources. The Mobile Virtual Network Operators (MVNOs) are able to recent these resources from the InPs and operate the virtualized resources for providing services to different users. In particular, aiming to maximize the overall utility …

Optimizationenergy harvestingreinforcement learningvirtualisointiComputer scienceDistributed computingresource allocationsyväoppiminenwireless network virtualizationresursointicomputer.software_genreIndium phosphideenergian kerääminenIII-V semiconductor materialsBase stationVirtualizationHybrid power systemsWirelessResource managementElectrical and Electronic EngineeringWireless networksbusiness.industryWireless networkApplied MathematicsResource managementdeep learningVirtualizationGridComputer Science ApplicationskoneoppiminenResource allocationbusinessADMMcomputerHeterogeneous networklangattomat verkot
researchProduct

The hyplet : Joining a Program and a Nanovisor for real-time and Performance

2020

This paper presents the concept of sharing a hyper-visor address space with a standard Linux program. In this work, we add hypervisor awareness to the Linux kernel and execute code in the HYP exception level through using the hyplet. The hyplet is an innovative way to code interrupt service routines and remote procedure calls under ARM. The hyplet provides high performance and run-time predictability. We demonstrate the hyplet implementation using the C programming language on an ARM8v-a platform and under the Linux kernel. We then provide performance measurements, use cases, and security scenarios. peerReviewed

Software_OPERATINGSYSTEMSvirtualisointiLinuxtietoturva
researchProduct