Hannah Pruse

Learn More
Virtualization is the cornerstone of the developing third party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the <i>co-resident threat</i> -- unless perfect isolation is provided by the(More)
—Determining a computer's identity is a challenge of critical importance to users wishing to ensure that they are interacting with the correct system; it is also extremely valuable to forensics investigators. However, even hosts that contain trusted computing hardware to establish identity can be defeated by relay and impersonation attacks. In this paper,(More)
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual(More)
1 Introduction Video games have become ubiquitous as both entertainment and computer-mediated social interaction, and due to their interactivity may be more influential than films, television, and other electronic media. Games have even become part of children's development and therefore may have heavy influence on skill and character development of the(More)
  • 1