Pvm: Efficient shadow paging for deploying secure containers in cloud-native environment

H Huang, J Lai, J Rao, H Lu, W Hou, H Su… - Proceedings of the 29th …, 2023‏ - dl.acm.org
In cloud-native environments, containers are often deployed within lightweight virtual
machines (VMs) to ensure strong security isolation and privacy protection. With the growing …

A cryptographic view of deep-attestation, or how to do provably-secure layer-linking

G Arfaoui, PA Fouque, T Jacques, P Lafourcade… - … Conference on Applied …, 2022‏ - Springer
Deep attestation is a particular case of remote attestation, ie, verifying the integrity of a
platform with a remote verification server. We focus on the remote attestation of hypervisors …

Fast and live hypervisor replacement

S Doddamani, P Sinha, H Lu, THK Cheng… - Proceedings of the 15th …, 2019‏ - dl.acm.org
Hypervisors are increasingly complex and must be often updated for applying security
patches, bug fixes, and feature upgrades. However, in a virtualized cloud infrastructure …

LTE NFV rollback recovery

MT Raza, Z Tan, A Tufail… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Network Function Virtualization (NFV) migrates the carrier-grade LTE Evolved Packet Core
(EPC) that runs on commodity boxes to the public cloud. In the new virtualized environment …

Fast local VM migration against hypervisor corruption

F Cerveira, R Barbosa… - 2019 15th European …, 2019‏ - ieeexplore.ieee.org
Virtual machine migration is an established technique for tolerating hardware faults affecting
the virtualization infrastructure. Normally migration is performed between different physical …

SDFS: A software‐defined file system for multitenant cloud storage

J Liu, F Wang, L Zeng, D Feng… - Software: Practice and …, 2019‏ - Wiley Online Library
Performance isolation is highly desirable in cloud platforms where the virtual disks of virtual
machines are simply large files on the shared and networked storage servers. However …

Design and analysis of provably secure protocols: Applications to messaging and attestation

L Robert - 2022‏ - theses.hal.science
Post-Compromise Security (PCS) is a property of secure-channelestablishment schemes
which limits the security breach of anadversary that has compromised one of the endpoints …

Techniques for non-disruptive operating system upgrade

TFR Stumpf, A Kaila, A Drzewiecki, VM Sekhar… - US Patent …, 2023‏ - Google Patents
2021-06-02 Assigned to VMWARE, INC. reassignment VMWARE, INC. ASSIGNMENT OF
ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DRZEWIECKI …

[PDF][PDF] Doctorat de L'Université Clermont Auvergne

L Robert - 2022‏ - perso.limos.fr
Abstract Post-Compromise Security (PCS) is a property of secure-channel establishment
schemes which limits the security breach of an adversary that has compromised one of the …

Persisting Memcached with VM Memory Snapshot

D Li, X Tian, S Huang, H Liu, Y Tang… - 2017 IEEE International …, 2017‏ - ieeexplore.ieee.org
Memory object caching system, such as Memcached, is being used popularly in speeding
up dynamic web applications by reducing database load. However, both policy and …