Learn More
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components for providing virtual hardware devices and for sharing and protecting system resources among virtual machines (VMs), enlarging the code size of and reducing the reliability of(More)
With the recent rapid increase in interactive Web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats. The SQL injection attack allows an attacker to access the underlying database, execute arbitrary commands at intent, and receive a dynamically generated output, such as HTML Web(More)
Graphics processing units (GPUs) provide orders-of-magnitude speedup for compute-intensive data-parallel applications. However, enterprise and cloud computing domains, where resource isolation of multiple clients is required, have poor access to GPU technology. This is due to lack of operating system (OS) support for vir-tualizing GPUs in a reliable manner.(More)
The usefulness of pH-sensitive fusogenic polymer-(succinylated poly(glycidol)-(SucPG-) modified liposomes as a vaccine carrier in the induction of immune responses was evaluated. Mice were intraperitoneally immunized with ovalbumin- (OVA-) containing SucPG-modified liposomes. After immunization, significant OVA-specific antibodies were detected in the(More)
Executable content poses a threat of unauthorized access because it contains program code running on the user's machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This(More)
Live migration of virtual machines (VMs) is an attractive technique for managing cloud computing platforms such as those for load balancing and maintenance of physical machines. However, the execution of live migration significantly consumes computational resources on the source and destination, thus causing <i>migration noise</i> that degrades the(More)