A Virtual Machine Cloning Approach Based on Trusted Computing

Author(s):  
Wei Ma ◽  
Xiaoyong Li ◽  
Yong Shi ◽  
Yu Guo
2019 ◽  
Vol 24 (5) ◽  
pp. 520-534 ◽  
Author(s):  
Xin Jin ◽  
Qixu Wang ◽  
Xiang Li ◽  
Xingshu Chen ◽  
Wei Wang

2014 ◽  
Vol 511-512 ◽  
pp. 1219-1224
Author(s):  
Song Zhu Mei ◽  
Hai He Ba ◽  
Jiang Chun Ren ◽  
Zhi Ying Wang ◽  
Jun Ma

This paper gives out a novel way, TCFI4J, to enforce the control flow integrity to the Java applications based on Java virtual machine. TCFI4J combines the trusted computing technology and Java virtual machine together. It takes full advantage of the Trusted Platform Module (TPM) and gives full consideration to the memory organization of the JVM. TCFI4J takes the integrity of part of JVMs memory image into account for the control flow integrity enforcement. The method presented in this paper can provide the user information about an applications behavior. It can significantly improve the security of a Java application with a tolerable performance impact.


2012 ◽  
Vol 482-484 ◽  
pp. 279-286
Author(s):  
Zhi Gang Si ◽  
Ping Li ◽  
Xin Chen ◽  
Ying Wan

A trusted computing platform is designed based on XEN virtual machine, and a dynamic integrity measurement scheme is presented using hypercall mechanism. This scheme can solve the deficiency of limited scope or complicated structure comparing with other dynamic integrity measurement schemes.


Author(s):  
James Hardy ◽  
Lu Liu ◽  
Cui Lei ◽  
Jianxin Li

Virtualisation is massively important in computing and continues to develop. This chapter discusses and evaluates the virtualisation technologies and in particular, a state-of-art system called iVIC (the Internet-based Virtual Computing) developed by Beihang University, China as it provides an all-in-one example of many of the major headline Cloud Computing titles of SaaS, IaaS, and HaaS. The chapter considers several virtualization packages which are either commercial, community, or experimental, before focusing on iVIC, a virtual machine cloning system that may be beneficial in a learning or office environment. The chapter introduces a test environment which is used to assess the performance of the iVIC process and the virtual machines created. Power requirements of virtual, as opposed to physical machines, are compared and evaluated. The chapter closes with conclusions regarding virtualisation and iVIC.


Sign in / Sign up

Export Citation Format

Share Document