Learn More
Memory deduplication shares same-content memory pages and reduces the consumption of physical memory. It is effective on environments that run many virtual machines with the same operating system. Memory deduplication, however, is vulnerable to memory disclosure attacks, which reveal the existence of an application or file on another virtual machine. Such(More)
Current OSes include many logical sharing techniques (shared library, symbolic link, etc.) on memory and storage. Unfortunately they cause security and management problems which come from the dynamic management of logical sharing; e.g., search path replacement attack, GOT (Global Offset Table) overwrite attack, Dependency Hell, etc. This paper proposes that(More)
SUMMARY Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory dedupli-cation is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an(More)
OS Circular is a framework for Internet Disk Image Distribution of software for virtual machines , those which offer a ''virtualized'' common PC environment on any PC. OS images are obtained via the stackable virtual disk ''Trusted HTTP-FUSE CLOOP''. The system is designed to utilize Mirror servers and Proxies for highly-scalable worldwide deployment. OS(More)
1 Statement of the problem In the 1960s, using computers was synonymous with writing programs. The first generation of micro computers started to appear in the 1970s, computer users shared their source code and programs. During the 1980s, desktop personal computers were becoming common, and software packages became commercial products. During the 1990s, the(More)
  • 1