Academic literature on the topic 'Hypervisor'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hypervisor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hypervisor"

1

Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (July 1, 2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.

Full text
Abstract:
<p>Server virtualization is a fundamental technological innovation that is used extensively in IT enterprises. Server virtualization enables creation of multiple virtual machines on single underlying physical machine. It is realized either in form of hypervisors or containers. Hypervisor is an extra layer of abstraction between the hardware and virtual machines that emulates underlying hardware. In contrast, the more recent container-based virtualization technology runs on host kernel without additional layer of abstraction.Thus container technology is expected to provide near native performance compared to hypervisor based technology. We have conducted a series of experiments to measure and compare the performance of workloads over hypervisor based virtual machines, Docker containers and native bare metal machine. We use a standard benchmark workload suite that stress CPU, memory, disk IO and system. The results obtained show that Docker containers provide better or similar performance compared to traditional hypervisor based virtual machines in almost all the tests. However as expected the native system still provides the best performance as compared to either containers or hypervisors.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Barrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.

Full text
Abstract:
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor’s vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
APA, Harvard, Vancouver, ISO, and other styles
3

Boberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (March 22, 2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.

Full text
Abstract:
U ovom radu predstavljena je imple­mentacija i optimizacija sistema za particionisanje centralne procesorske jedinice sa više jezgara. Sistem se sastoji iz UltraZed-EG ploče na kojoj je implementiran Xen Hypervisor kao sistem za particionisanje. Xen Hypervisor je virtuelni sloj koji koristi postojeći operativni sistem (host) koji mu omogućava pristup memoriji, prekidima i drugim resursima i omogućava kreiranje virtuelnih jezgara koja se po instrukcijama korisnika mogu raspoređivati na fizička jezgra. Dat je akcenat na real-time particionisanje i optimizaciju Xen Hypervisora u cilju poboljšanja performansi.
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (October 2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.

Full text
Abstract:
Virtualization is critical to cloud computing and is possible through hypervisors, which maps the Virtual machines((VMs) to physical resources but poses security concerns as users relinquish physical possession of their computation and data. Good amount of research is initiated for resource provisioning on hypervisors, still many issues need to be addressed for security demanding and real time VMs. First work SRT-CreditScheduler (Secured and Real-time), maximizes the success rate by dynamically prioritizing the urgency and the workload of VMs but ensures highest security for all. Another work, SA-RT-CreditScheduler (Security-aware and Real-time) is a dual objective scheduler, which maximizes the success rate of VMs in best possible security range as specified by the VM owner. Though the algorithms can be used by any hypervisor, for the current work they have been implemented on Xen hypervisor. Their effectiveness is validated by comparing it with Xen's, Credit and SEDF scheduler, for security demanding tasks with stringent deadline constraints.
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (January 2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Daniel, Joao Rafael, and Alexandre Fonte. "Virtualization Maturity in Creating System VM: An Updated Performance Evaluation." International Journal of Electrical and Computer Engineering Research 3, no. 2 (June 15, 2023): 7–17. http://dx.doi.org/10.53375/ijecer.2023.341.

Full text
Abstract:
Virtualization technologies are indispensable in operating data centers and supporting cloud infrastructures, providing cost reduction (CapEx and OpEx), high availability, and disaster recovery. Hypervisor-assisted virtualization is one of the leading virtualization technologies, with the hypervisor being the software layer responsible for presenting the virtualized view of the hardware to system-level VMs. However, the virtualization overhead it introduces has implications into the computing infrastructure performance. This paper revisits key concepts about virtualization, technologies and techniques, types of VMs and hypervisors, and provides an up-to-date comparison between native and VM environments using workload metrics such as CPU and memory scores, disk speed, and network throughput to determine virtualization overhead. Our results show a clear overall trend toward meritorious performance and the maturity of the technologies used to create system-level VMs.
APA, Harvard, Vancouver, ISO, and other styles
7

Patange, Pritam. "Virtual Disks Performance Analysis Using Flexible I/O and Powerstat." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 267–96. http://dx.doi.org/10.22214/ijraset.2021.38392.

Full text
Abstract:
Abstract: Cloud computing has experienced significant growth in the recent years owing to the various advantages it provides such as 24/7 availability, quick provisioning of resources, easy scalability to name a few. Virtualization is the backbone of cloud computing. Virtual Machines (VMs) are created and executed by a software called Virtual Machine Monitor (VMM) or the hypervisor. It separates compute environments from the actual physical infrastructure. A disk image file representing a single virtual machine is created on the hypervisor’s file system. In this paper, we analysed the runtime performance of multiple different disk image file formats. The analysis comprises of four different parameters of performance namely- bandwidth, latency, input-output operations performed per second (IOPS) and power consumption. The impact of the hypervisor’s block and file sizes is also analysed for the different file formats. The paper aims to act as a reference for the reader in choosing the most appropriate disk file image format for their use case based on the performance comparisons made between different disk image file formats on two different hypervisors – KVM and VirtualBox. Keywords: Virtualization, Virtual disk formats, Cloud computing, fio, KVM, virt-manager, powerstat, VirtualBox.
APA, Harvard, Vancouver, ISO, and other styles
8

Doğan, Atakan, and Kemal Ebcioğlu. "Cloud Building Block Chip for Creating FPGA and ASIC Clouds." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (June 30, 2022): 1–35. http://dx.doi.org/10.1145/3466822.

Full text
Abstract:
Hardware-accelerated cloud computing systems based on FPGA chips (FPGA cloud) or ASIC chips (ASIC cloud) have emerged as a new technology trend for power-efficient acceleration of various software applications. However, the operating systems and hypervisors currently used in cloud computing will lead to power, performance, and scalability problems in an exascale cloud computing environment. Consequently, the present study proposes a parallel hardware hypervisor system that is implemented entirely in special-purpose hardware, and that virtualizes application-specific multi-chip supercomputers, to enable virtual supercomputers to share available FPGA and ASIC resources in a cloud system. In addition to the virtualization of multi-chip supercomputers, the system’s other unique features include simultaneous migration of multiple communicating hardware tasks, and on-demand increase or decrease of hardware resources allocated to a virtual supercomputer. Partitioning the flat hardware design of the proposed hypervisor system into multiple partitions and applying the chip unioning technique to its partitions, the present study introduces a cloud building block chip that can be used to create FPGA or ASIC clouds as well. Single-chip and multi-chip verification studies have been done to verify the functional correctness of the hypervisor system, which consumes only a fraction of (10%) hardware resources.
APA, Harvard, Vancouver, ISO, and other styles
9

Caturiyanto, Totok Wahyu, Arief Setyanto, and Eko Pramono. "Analisa Dan Perbandingan Performa Hypervisor ESXi, XEN, VMWARE Workstation Pro, Dan Virtualbox." Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat 6, no. 2 (December 15, 2020): 40–44. http://dx.doi.org/10.46808/informa.v6i2.182.

Full text
Abstract:
Virtualisasi memberi kita banyak ruang untuk berkembang dalam teknologi informasi, dengan satu unit server kita dapat membuat mesin virtual sebanyak yang kita butuhkan. Mengurangi biaya investasi dan operasional untuk memajukan sisi lain bisnis adalah salah satu keuntungan virtualisasi. Salah satu perangkat lunak untuk menjembatani mesin virtual adalah hypervisor atau monitor mesin virtual. Tujuan dari penulisan ini adalah untuk mengetahui hypervisor mana yang merupakan performa terbaik dari keempat hypervisor yang dipilih oleh penulis yang mewakili setiap jenis hypervisor. ESXi, Xen, VMWare Workstation Pro dan Virtualbox. ESXi mewakili hypervisor baremetal berlisensi berbayar, Xen mewakili hypervisor baremetal versi gratis, VMWare Workstation Pro mewakili hosted hypervisor versi berlisensi dan Virtualbox mewakili hosted hypervisor versi gratis. Percobaan dilakukan dengan satu mesin, dengan sumber daya yang sama, dilakukan secara mandiri dan bergantian. Makalah ini menggunakan metode eksperimental untuk mendeskripsikan proses. Kesimpulannya adalah bahwa versi berlisensi atau versi gratis dari empat hypervisor yang disebutkan di atas tidak memengaruhi kinerjanya, hanya berapa banyak fitur yang tersedia dari pengembang.
APA, Harvard, Vancouver, ISO, and other styles
10

Perneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (August 17, 2015): 832–40. http://dx.doi.org/10.48084/etasr.568.

Full text
Abstract:
System virtualization is one of the hottest trends in information technology today. It is not just another nice to use technology but has become fundamental across the business world. It is successfully used with many business application classes where cloud computing is the most visual one. Recently, it started to be used for soft Real-Time (RT) applications such as IP telephony, media servers, audio and video streaming servers, automotive and communication systems in general. Running these applications on a traditional system (Hardware + Operating System) guarantee their Quality of Service (QoS); virtualizing them means inserting a new layer between the hardware and the (virtual) Operating System (OS), and thus adding extra overhead. Although these applications’ areas do not always demand hard time guarantees, they require the underlying virtualization layer supports low latency and provide adequate computational resources for completion within a reasonable or predictable timeframe. These aspects are intimately intertwined with the logic of the hypervisor scheduler. In this paper, a series of tests are conducted on three hypervisors (VMware ESXi, Hyper-V server and Xen) to provide a benchmark of the latencies added to the applications running on top of them. These tests are conducted for different scenarios (use cases) to take into consideration all the parameters and configurations of the hypervisors’ schedulers. Finally, this benchmark can be used as a reference for choosing the best hypervisor-application combination.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hypervisor"

1

Cardace, Antonio. "UMView, a Userspace Hypervisor Implementation." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13184/.

Full text
Abstract:
UMView is a partial virtual machine and userspace hypervisor capable of intercepting system calls and modifying their behavior according to the calling process' view. In order to provide flexibility and modularity UMView supports modules loadable at runtime using a plugin architecture. UMView in particular is the implementation of the View-OS concept which negates the global view assumption which is so radically established in the world of OSes and virtualization.
APA, Harvard, Vancouver, ISO, and other styles
2

Klemperer, Peter Friedrich. "Efficient Hypervisor Based Malware Detection." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/466.

Full text
Abstract:
Recent years have seen an uptick in master boot record (MBR) based rootkits that load before the Windows operating system and subvert the operating system’s own procedures. As such, MBR rootkits are difficult to counter with operating system-based antivirus software that runs at the same privilege-level as the rookits. Hypervisors operate at a higher privilege level than the guests they manage, creating a high-ground position in the host. This high-ground position can be exploited to perform security checks on the virtual machine guests where the checking software is isolated from guest-based viruses. The efficient introspection system described in this thesis targets existing virtualized systems to improve security with real-time, concurrent memory introspection capabilities. Efficient introspection decouples memory introspection from virtual machine guest execution, establishes coherent and consistent memory views between the host and running guest, while maintaining normal guest operation. Existing introspection systems have provided one or two of these properties but not all three at once. This thesis presents a new concurrent-computing approach – high-performance memory snapshotting – to accelerating hypervisor based introspection of virtual machine guest memory that combines all three elements to improve performance and security. Memory snapshots create a coherent and consistent memory view of the guest that can be shared with the independently running introspection application. Three memory snapshotting mechanisms are presented and evaluated for their impact on normal guest operation. Existing introspection systems and security protection techniques that were previously dismissed as too slow are now be enabled by efficient introspection. This thesis explains why existing introspection systems are inadequate, describes how existing system performance can be improved, evaluates an efficient introspection prototype on both applications and microbenchmarks, and discusses two potential security applications that are enabled by efficient introspection. These applications point to efficient introspection’s utility for supporting useful security applications.
APA, Harvard, Vancouver, ISO, and other styles
3

McAdams, Sean. "Virtualization Components of the Modern Hypervisor." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/599.

Full text
Abstract:
Virtualization is the foundation on which cloud services build their business. It supports the infrastructure for the largest companies around the globe and is a key component for scaling software for the ever-growing technology industry. If companies decide to use virtualization as part of their infrastructure it is important for them to quickly and reliably have a way to choose a virtualization technology and tweak the performance of that technology to fit their intended usage. Unfortunately, while many papers exist discussing and testing the performance of various virtualization systems, most of these performance tests do not take into account components that can be configured to improve performance for certain scenarios. This study provides a comparison of how three hypervisors (VMWare vSphere, Citrix XenServer, and KVM) perform under different sets of configurations at this point and which system workloads would be ideal for these configurations. This study also provides a means in which to compare different configurations with each other so that implementers of these technologies have a way in which to make informed decisions on which components should be enabled for their current or future systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, Tawfiq M. "Radium: Secure Policy Engine in Hypervisor." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804971/.

Full text
Abstract:
The basis of today’s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted state. The trust is built from hardware and software elements that generates a chain of trust that originates from a trusted known entity. Leveraging hardware, software and a mandatory access control policy technology is needed to create a trusted measurement environment. Employing a control layer (hypervisor or microkernel) with the ability to enforce a fine grained access control policy with hyper call granularity across multiple guest virtual domains can ensure that any malicious environment to be contained. In my research, I propose the use of radium's Asynchronous Root of Trust Measurement (ARTM) capability incorporated with a secure mandatory access control policy engine that would mitigate the limitations of the current hardware TPM solutions. By employing ARTM we can leverage asynchronous use of boot, launch, and use with the hypervisor proving its state and the integrity of the secure policy. My solution is using Radium (Race free on demand integrity architecture) architecture that will allow a more detailed measurement of applications at run time with greater semantic knowledge of the measured environments. Radium incorporation of a secure access control policy engine will give it the ability to limit or empower a virtual domain system. It can also enable the creation of a service oriented model of guest virtual domains that have the ability to perform certain operations such as introspecting other virtual domain systems to determine the integrity or system state and report it to a remote entity.
APA, Harvard, Vancouver, ISO, and other styles
5

Özcan, Mehmet Batuhan, and Gabriel Iro. "PARAVIRTUALIZATION IMPLEMENTATION IN UBUNTU WITH XEN HYPERVISOR." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2011.

Full text
Abstract:
With the growing need for efficiency, cost reduction, reduced disposition of outdated electronics components as well as scalable electronics components, and also reduced health effects of our daily usage of electronics components. Recent trend in technology has seen companies manufacturing these products thinking in the mentioned needs when manufacturing and virtualizations is one important aspect of it. The need to share resources, the need to use lesser workspace, the need to reduce cost of purchase and manufacturing are all part of achievements of virtualization techniques. For some people, setting up a computer to run different virtual machines at the same time can be difficult especially if they have no prior basic knowledge of working in terminal environment and hiring a skilled personnel to do the job can be expensive. The motivation for this thesis is to help people with little or no basic knowledge on how to set up virtual machine with Ubuntu operating system on XEN hypervisor.
APA, Harvard, Vancouver, ISO, and other styles
6

Suryanarayana, Vidya. "Impact of hypervisor cache locking on performance." Diss., Wichita State University, 2013. http://hdl.handle.net/10057/10616.

Full text
Abstract:
Server virtualization has become the modern trend in various industries. Industries are resorting to the deployment of virtualized servers in order to cut the cost of additional, expensive hardware and consolidate the servers on minimal hardware for easier management and maintenance. Virtualized servers are often seen connected to disk arrays in many industries ranging from small to medium business to large data centers. In such a setup, assuring a low latency of data access from the disk array plays an important role in improving the performance and robustness of the overall system. Caching techniques have been researched and used in the past on traditional processors to reduce the number of memory accesses and have proven benefits in alleviating the response times of applications. The research done in this paper explores caching on the hypervisor and analyzes the performance of data cache locking technique in hypervisor caches. The research aims at reducing the Input / Output (I/O) latency in a server virtualized Storage Area Network (SAN) setup, which thereby increases the performance of applications running on the virtualized servers. The authors introduce a miss table that can determine the blocks of data in the hypervisor cache that need to be locked. Way cache locking method is used for locking, such that only selected lines of cache are locked (not the entire cache). The proposed cache locking technique is later evaluated with the introduction of a small victim buffer cache and probability based cache replacement algorithm. Valgrind simulation tool was used to generate memory traces by virtual machines (VMs). Experimental results show an improved cache hit percentage and a considerable reduction in the I/O response time due to the proposed cache locking technique when compared to the results without hypervisor cache locking.
Thesis (Ph.D.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
7

Chan, Lawrence L. "Modeling virtualized application performance from hypervisor counters." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66404.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 61-64).
Managing a virtualized datacenter has grown more challenging, as each virtual machine's service level agreement (SLA) must be satisfied, when the service levels are generally inaccessible to the hypervisor. To aid in VM consolidation and service level assurance, we develop a modeling technique that generates accurate models of service level. Using only hypervisor counters as inputs, we train models to predict application response times and predict SLA violations. To collect training data, we conduct a simulation phase which stresses the application across many workloads levels, and collects each response time. Simultaneously, hypervisor performance counters are collected. Afterwards, the data is synchronized and used as training data in ensemble-based genetic programming for symbolic regression. This modeling technique is quite efficient at dealing with high-dimensional datasets, and it also generates interpretable models. After training models for web servers and virtual desktops, we test generalization across different content. In our experiments, we found that our technique could distill small subsets of important hypervisor counters from over 700 counters. This was tested for both Apache web servers and Windows-based virtual desktop infrastructures. For the web servers, we accurately modeled the breakdown points and also the service levels. Our models could predict service levels with 90.5% accuracy on a test set. On a untrained scenario with completely different contending content, our models predict service levels with 70% accuracy, but predict SLA violation with 92.7% accuracy. For the virtual desktops, on test scenarios similar to training scenarios, model accuracy was 97.6%. Our main contribution is demonstrating that a completely data-driven approach to application performance modeling can be successful. In contrast to many other works, our models do not use workload level or response times as inputs to the models, but nevertheless predicts service level accurately. Our approach also lets the models determine which inputs are important to a particular model's performance, rather than hand choosing a few inputs to train on.
by Lawrence L. Chan.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Govindharajan, Hariprasad. "Porting Linux to a Hypervisor Based Embedded System." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-205568.

Full text
Abstract:
Virtualization is used to improve overall system security, isolate the hardware and it properly manages the available system resources also. The main purpose of using virtualization in embedded systems is to increase the system security by isolating the underlying hardware and also by providing multiple secure execution environments for the guests. A hypervisor also called as the Virtual Machine monitor is responsible for mapping virtual resources to physical resources.Hypervisor based virtualization is gaining more popularity in embedded systems because of the security focussed mission critical applications. Linux OS is chosen because of its popular use in embedded systems. In this thesis, we list out the modifications required to port a Linux kernel onto a hypervisor. This Linux Kernel is already ported to ARM CPU and the hypervisor in question has been developed by Swedish Institute of Computer Science (SICS).
APA, Harvard, Vancouver, ISO, and other styles
9

Douglas, Heradon. "Thin Hypervisor-Based Security Architectures for Embedded Platforms." Thesis, SICS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-23667.

Full text
Abstract:
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and utilization, supported by hardware advances. It is also receiving attention for its potential to support security, through hypervisor-based services and advanced protections supplied to guests. Today, virtualization is even making inroads in the embedded space, and embedded systems, with their security needs, have already started to benefit from virtualization’s security potential. In this thesis, we investigate the possibilities for thin hypervisor-based security on embedded platforms. In addition to significant background study, we present implementation of a low-footprint, thin hypervisor capable of providing security protections to a single FreeRTOS guest kernel on ARM. Backed by performance test results, our hypervisor provides security to a formerly unsecured kernel with minimal performance overhead, and represents a first step in a greater research effort into the security advantages and possibilities of embedded thin hypervisors. Our results show that thin hypervisors are both possible and beneficial even on limited embedded systems, and sets the stage for more advanced investigations, implementations, and security applications in the future.
SVAMP
APA, Harvard, Vancouver, ISO, and other styles
10

Rybák, Martin. "Konsolidace serverů za použití virtualizace." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-77173.

Full text
Abstract:
The thesis deals with the topic of complexity of current IT. As a result, the consolidation of servers using virtualization is the answer to permanently growing complexity of server infrastructure. The thesis summarizes the basic aspects of this issue, compares the contributions and tries to analyze problems which can emerge. Further, it points a way of consolidation journey, compares different types of virtualization and elaborates the contributions of virtualization for corporate IS/ICT and its flexibility of solution. It analyzes present state of the market with virtualization tools, describes and compares some products of the market key players and analyzes the new opportunities for virtualization, e. g. the virtual desktop infrastructure. At the end, it suggests an approach for consolidated project solution in practice and tries to show some basic steps which should not be omitted. Besides the complex view to the topic, the thesis also presents the contributions, risks and questions to be raised and, at least partly, answers these questions.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hypervisor"

1

Chisnall, David. The definitive guide to the Xen hypervisor. Upper Saddle River, NJ: Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Shih-Wei. A Secure and Formally Verified Commodity Multiprocessor Hypervisor. [New York, N.Y.?]: [publisher not identified], 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1977-, Sterling Mike, and Stewart Allen 1969-, eds. Windows server 2008 Hyper-V: Insiders guide to Microsoft's Hypervisor. Indianapolis, Ind: Wiley Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kelbley, John. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Indianapolis: Wiley Technology Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1977-, Sterling Mike, ed. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Hoboken, NJ: Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xen Virtualization: A fast and practical guide to supporting multiple operating systems with the Xen Hypervisor. Birmingham: Packt Publishing, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Litty, Lionel. Hypervisor-based intrusion detection. 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Litty, Lionel. Hypervisor-based intrusion detection. 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

The Definitive Guide to the Xen Hypervisor. Prentice Hall PTR, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blokdyk, Gerardus. Embedded Hypervisor a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hypervisor"

1

Zaidenberg, Nezer Jacob, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, and Amit Resh. "Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot." In Communications in Computer and Information Science, 317–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Graziano, Mariano, Andrea Lanzi, and Davide Balzarotti. "Hypervisor Memory Forensics." In Research in Attacks, Intrusions, and Defenses, 21–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasudevan, Amit. "Micro-Hypervisor Applications." In Practical Security Properties on Commodity Computing Platforms, 73–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barrett/Norris, Kenneth/Stephen. "Building the Hypervisor Host." In Running Mainframe z on Distributed Platforms, 31–51. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6431-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cohen, Ernie. "Validating the Microsoft Hypervisor." In FM 2006: Formal Methods, 81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11813040_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mishra, Anand Kumar, Mahesh Govil, and Emmanuel Pilli. "A Taxonomy of Hypervisor Forensic Tools." In Advances in Digital Forensics XVI, 181–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56223-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alkassar, Eyad, Mark A. Hillebrand, Wolfgang Paul, and Elena Petrova. "Automated Verification of a Small Hypervisor." In Verified Software: Theories, Tools, Experiments, 40–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15057-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cohen, Ernie, Wolfgang Paul, and Sabine Schmaltz. "Theory of Multi Core Hypervisor Verification." In Lecture Notes in Computer Science, 1–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35843-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mutch, John, and Brian Anderson. "Protecting Virtual Environments from Hypervisor Sabotage." In Preventing Good People from doing Bad Things, 97–111. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3922-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tatashin, Pavel, and William Moloney. "Seamless Update of a Hypervisor Stack." In Lecture Notes in Networks and Systems, 509–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80119-9_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hypervisor"

1

Silva, Otávio A. A., and Paulo Lício de Geus. "Lokke, a hybrid security hypervisor." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19238.

Full text
Abstract:
This work did ample research on techniques used by advanced threats that aim to evade detection systems, elevate privileges and manipulate objects in a modern OS kernel, using the Windows 10 kernel as a test bench. Given state-of-the-art attacks in kernelspace, this work's main goal is to design a secure mechanism to protect the OS kernel against a class of attacks, not relying upon any specific vector. This mechanism is based on hybrid virtualization and combines the advantages of Type 1 and 2 hypervisors, where the hypervisor runs at the same level as the OS kernel does, but within a privileged execution framework. The design of this security framework allows for the integration with other security subsystems, by providing security policies enforced by the hypervisor and independently of the kernel.
APA, Harvard, Vancouver, ISO, and other styles
2

Ferruzzi, Adriano José, Christian Esteve Rothenberg, and Leandro Martinez. "Análise do Comportamento de Aplicações Paralelas em Ambientes de Computação de Alto Desempenho Virtualizados." In XVIII Workshop em Clouds e Aplicações. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/wcga.2020.12444.

Full text
Abstract:
A computação em nuvem tem se tornado cada vez mais frequente em empresas e universidades, principalmente devido ao fato da nuvem computacional ser mais facilmente administrada uma vez que seu ambiente esteja devidamente configurado. Entretanto, há resistência na implantação de ambientes de computação de alto desempenho em nuvem e isso, provavelmente, está associado ao fato da nuvem precisar de um hypervisor para a administração das máquinas virtuais, resultando em uma perda de desempenho causado pela camada de virtualização. Por outro lado, as tecnologias de virtualização estão em constante avanço, tornando essa perda de desempenho menor com o passar dos anos. Sendo assim, o trabalho faz a análise do desempenho de aplicações paralelas e da infraestrutura utilizada além de avaliar as características dos hypervisors XenServer e KVM com o propósito de comparar o desempenho de cada ambiente e identificar qual a melhor hypervisor a ser utilizada na criação de um ambiente de computação de alto desempenho virtualizado.
APA, Harvard, Vancouver, ISO, and other styles
3

Myren, Jason, and Mitch Groen. "Architecture And Application Of Hypervisor In FACE Environment With Safety Assurance." In Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16427.

Full text
Abstract:
Collins Aerospace recognizes the value the warfighter gets from reducing the Size, Weight and Power (SWAP) of the avionics systems. The war fighter also sees benefit from reuse of existing avionics and mission software modules, which frequently vary in software framework and thus are allocated to separate processors. A solution, as seen in the commercial IT industry would be the use of multi-core processing and hypervisors allowing the mixing of frameworks providing rapid integration with minimal SWAP. In avionics we must additionally provide assurance. This paper will explore our application of the FACE™ Technical Standard (Ref. [1]) to obtain framework variability, used in conjunction with a hypervisor to allow the resulting frameworks to exist in a single multi-core processing environment with safety assurance to the solution. The concept proposed was validated through demonstration of US Army and Collins software running on the same multi-core processor.
APA, Harvard, Vancouver, ISO, and other styles
4

Sartakov, Vasily A., and Rudiger Kapitza. "NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

VanderLeest, Steven H. "ARINC 653 hypervisor." In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Naughton, Thomas, Geoffroy Vallee, Stephen L. Scott, and Ferrol Aderholdt. "Loadable Hypervisor Modules." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dubrulle, P., R. Sirdey, P. Dore, M. Aichouch, and E. Ohayon. "Blind hypervision to protect virtual machine privacy against hypervisor escape vulnerabilities." In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 2015. http://dx.doi.org/10.1109/indin.2015.7281938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors." In 4th International Conference on Cloud Computing and Services Science. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0004958006040609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thongthua, Ammarit, and Sudsanguan Ngamsuriyaroj. "Assessment of Hypervisor Vulnerabilities." In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). IEEE, 2016. http://dx.doi.org/10.1109/icccri.2016.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gantet, Anais. "CrashOS: Hypervisor Testing Tool." In 2017 IEEE 28th International Symposium on Software Reliability Engineering: Workshops (ISSREW). IEEE, 2017. http://dx.doi.org/10.1109/issrew.2017.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hypervisor"

1

Chandramouli, Ramaswamy. Security recommendations for hypervisor deployment on servers. Gaithersburg, MD: National Institute of Standards and Technology, January 2018. http://dx.doi.org/10.6028/nist.sp.800-125a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chandramouli, Ramaswamy. Security recommendations for server-based hypervisor platforms. Gaithersburg, MD: National Institute of Standards and Technology, June 2018. http://dx.doi.org/10.6028/nist.sp.800-125ar1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasudevan, Amit, Jonathan M. McCune, and James Newsome. It's an app. It's a hypervisor. It's a hypapp. : Design and Implementation of an eXtensible and Modular Hypervisor Framework. Fort Belvoir, VA: Defense Technical Information Center, June 2012. http://dx.doi.org/10.21236/ada579935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chandramouli, Ramaswamy, Anoop Singhal, Duminda Wijesekera, and Changwei Liu. Methodology for enabling forensic analysis using hypervisor vulnerabilities data. Gaithersburg, MD: National Institute of Standards and Technology, June 2019. http://dx.doi.org/10.6028/nist.ir.8221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chaki, Sagar, Amit Vasudevan, Limin Jia, Jonathan McCune, and Anupam Datta. Design, Development, and Automated Verification of an Integrity-Protected Hypervisor. Fort Belvoir, VA: Defense Technical Information Center, July 2012. http://dx.doi.org/10.21236/ada579386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Asai, H., M. MacFaden, J. Schoenwaelder, K. Shima, and T. Tsou. Management Information Base for Virtual Machines Controlled by a Hypervisor. RFC Editor, October 2015. http://dx.doi.org/10.17487/rfc7666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mitchum, Terrence, Kent Larson, Raymond Lu, Brian Loe, and Dick O'Brien. Hypervisors for Security and Robustness. Fort Belvoir, VA: Defense Technical Information Center, February 1999. http://dx.doi.org/10.21236/ada360460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zaharia, Matei, Sachin Katti, Chris Grier, Vern Paxson, Scott Shenker, Ion Stoica, and Dawn Song. Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada555877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography