Learn More
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components for providing virtual hardware devices and for sharing and protecting system resources among virtual machines (VMs), enlarging the code size of and reducing the reliability of(More)
Graphics processing units (GPUs) provide orders-of-magnitude speedup for compute-intensive data-parallel applications. However, enterprise and cloud computing domains, where resource isolation of multiple clients is required, have poor access to GPU technology. This is due to lack of operating system (OS) support for vir-tualizing GPUs in a reliable manner.(More)
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats. The SQL injection attack allows an attacker to access the underlying database, execute arbitrary commands at intent, and receive a dynamically generated output, such as HTML web(More)
Remote procedure call (RPC) systems have been proven to be a practical basis for building distributed applications. The RPC technique abstracts a typical communication pattern to an ordinary procedure call. Compared with an ordinary procedure call, however , the conventional RPC technique has one evident restriction; pointers (addresses) cannot be passed to(More)
Live migration of virtual machines (VMs) is an attractive technique for managing cloud computing platforms such as those for load balancing and maintenance of physical machines. However, the execution of live migration significantly consumes computational resources on the source and destination, thus causing <i>migration noise</i> that degrades the(More)