Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems

被引:0
|
作者
机构
[1] Zheng, Junjun
[2] Okamura, Hiroyuki
[3] Dohi, Tadashi
来源
| 1600年 / Institute of Electrical and Electronics Engineers Inc., United States卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133
  • [2] Survivability Analysis of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
  • [3] Performance Evaluation of VM-Based Intrusion Tolerant Systems with Poisson Arrivals
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 181 - 187
  • [4] Analysis of VM Communication for VM-based Cloud Security Systems
    Mthunzi, Siyakha N.
    Benkhelifa, Elhadj
    Alsmirat, Mohammad A.
    Jararweh, Yaser
    2018 FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2018, : 182 - 188
  • [5] Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 156 - 163
  • [6] VM-based Security Overkill: A Lament for Applied Systems Security Research
    Bratus, Sergey
    Locasto, Michael E.
    Ramaswamy, Ashwin
    Smith, Sean W.
    NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 51 - 60
  • [7] AUTOMATED APPROACH TO INTRUSION DETECTION IN VM-BASED DYNAMIC EXECUTION ENVIRONMENT
    Zhao, Feng
    Jin, Hai
    COMPUTING AND INFORMATICS, 2012, 31 (02) : 271 - 297
  • [8] Towards a Formally Verified Security Monitor for VM-based Confidential Computing
    Ozga, Wojciech
    Hunt, Guerney D. H.
    Le, Michael V.
    Palmer, Elaine R.
    Shinnar, Avraham
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 73 - 81
  • [9] A VM-based Approach for Real-Time EtherCAT Control
    Huang, Yu-Lun
    Lu, Chien-Hao
    2014 CACS INTERNATIONAL AUTOMATIC CONTROL CONFERENCE (CACS 2014), 2014, : 344 - 348
  • [10] Security attributes analysis for intrusion tolerant systems
    Yin, Li-Hua
    Fang, Bin-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1505 - 1512