Pvm: Efficient shadow paging for deploying secure containers in cloud-native environment
In cloud-native environments, containers are often deployed within lightweight virtual
machines (VMs) to ensure strong security isolation and privacy protection. With the growing …
machines (VMs) to ensure strong security isolation and privacy protection. With the growing …
A cryptographic view of deep-attestation, or how to do provably-secure layer-linking
Deep attestation is a particular case of remote attestation, ie, verifying the integrity of a
platform with a remote verification server. We focus on the remote attestation of hypervisors …
platform with a remote verification server. We focus on the remote attestation of hypervisors …
Fast and live hypervisor replacement
Hypervisors are increasingly complex and must be often updated for applying security
patches, bug fixes, and feature upgrades. However, in a virtualized cloud infrastructure …
patches, bug fixes, and feature upgrades. However, in a virtualized cloud infrastructure …
LTE NFV rollback recovery
Network Function Virtualization (NFV) migrates the carrier-grade LTE Evolved Packet Core
(EPC) that runs on commodity boxes to the public cloud. In the new virtualized environment …
(EPC) that runs on commodity boxes to the public cloud. In the new virtualized environment …
Fast local VM migration against hypervisor corruption
Virtual machine migration is an established technique for tolerating hardware faults affecting
the virtualization infrastructure. Normally migration is performed between different physical …
the virtualization infrastructure. Normally migration is performed between different physical …
SDFS: A software‐defined file system for multitenant cloud storage
Performance isolation is highly desirable in cloud platforms where the virtual disks of virtual
machines are simply large files on the shared and networked storage servers. However …
machines are simply large files on the shared and networked storage servers. However …
Design and analysis of provably secure protocols: Applications to messaging and attestation
L Robert - 2022 - theses.hal.science
Post-Compromise Security (PCS) is a property of secure-channelestablishment schemes
which limits the security breach of anadversary that has compromised one of the endpoints …
which limits the security breach of anadversary that has compromised one of the endpoints …
Techniques for non-disruptive operating system upgrade
TFR Stumpf, A Kaila, A Drzewiecki, VM Sekhar… - US Patent …, 2023 - Google Patents
2021-06-02 Assigned to VMWARE, INC. reassignment VMWARE, INC. ASSIGNMENT OF
ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DRZEWIECKI …
ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DRZEWIECKI …
[PDF][PDF] Doctorat de L'Université Clermont Auvergne
L Robert - 2022 - perso.limos.fr
Abstract Post-Compromise Security (PCS) is a property of secure-channel establishment
schemes which limits the security breach of an adversary that has compromised one of the …
schemes which limits the security breach of an adversary that has compromised one of the …
Persisting Memcached with VM Memory Snapshot
Memory object caching system, such as Memcached, is being used popularly in speeding
up dynamic web applications by reducing database load. However, both policy and …
up dynamic web applications by reducing database load. However, both policy and …