메뉴 건너뛰기




Volumn , Issue , 2007, Pages 46-50

Pocket hypervisors: Opportunities and challenges

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE COMPUTING SYSTEMS; SECURE OPERATING SYSTEMS; SECURITY SERVICES; TEST-BEDS; VIRTUALIZATION;

EID: 46449104590     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WMCSA.2007.4389557     Document Type: Conference Paper
Times cited : (33)

References (27)
  • 1
    • 46449123862 scopus 로고    scopus 로고
    • First mobile phone virus created. BBC, June 16, 2004.
    • First mobile phone virus created. BBC, June 16, 2004.
  • 2
    • 84885639914 scopus 로고    scopus 로고
    • A. J. et al. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP, October 2005.
    • A. J. et al. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP, October 2005.
  • 3
    • 46449092375 scopus 로고    scopus 로고
    • A. L. et al. Place Lab: Device positioning using radio beacons in the wild. In Pervasive, May 2005.
    • A. L. et al. Place Lab: Device positioning using radio beacons in the wild. In Pervasive, May 2005.
  • 4
    • 84860593849 scopus 로고    scopus 로고
    • D. I. et al. Sharing networked resources with brokered leases. In USENIX, June 2006.
    • D. I. et al. Sharing networked resources with brokered leases. In USENIX, June 2006.
  • 5
    • 46449094500 scopus 로고    scopus 로고
    • D. R. et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols. In WCNC, March 2005.
    • D. R. et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols. In WCNC, March 2005.
  • 6
    • 46449103455 scopus 로고    scopus 로고
    • D. T. et al. LLAMA: An adaptive strategy for utilizing excess energy to perform background tasks on mobile devices. In University of Massachusetts Technical Report TR-06-44, September 2006.
    • D. T. et al. LLAMA: An adaptive strategy for utilizing excess energy to perform background tasks on mobile devices. In University of Massachusetts Technical Report TR-06-44, September 2006.
  • 7
    • 46449092376 scopus 로고    scopus 로고
    • E. B. et al. Disco: Running commodity operating systems on scalable multiprocessors. TOCS, 15(4), 1997.
    • E. B. et al. Disco: Running commodity operating systems on scalable multiprocessors. TOCS, 15(4), 1997.
  • 8
    • 46449134054 scopus 로고    scopus 로고
    • G. W. D. et al. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, December 2002.
    • G. W. D. et al. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, December 2002.
  • 9
    • 46449094181 scopus 로고    scopus 로고
    • H. Z. et al. ECOSystem: Managing power as a first class operating system resource. In ASPLOS, October 2002.
    • H. Z. et al. ECOSystem: Managing power as a first class operating system resource. In ASPLOS, October 2002.
  • 10
    • 46449089921 scopus 로고    scopus 로고
    • J. D. et al. SIM trust parameters. In Intel Developer Update Magazine, January 2003.
    • J. D. et al. SIM trust parameters. In Intel Developer Update Magazine, January 2003.
  • 11
    • 46449085724 scopus 로고    scopus 로고
    • L. P. C. et al. Presence exchanges: Towards sustainable presence-sharing. In HotMobile, April 2006.
    • L. P. C. et al. Presence exchanges: Towards sustainable presence-sharing. In HotMobile, April 2006.
  • 12
    • 46449120860 scopus 로고    scopus 로고
    • M. R. et al. Virtual machine monitors: Current technology and future trends. In IEEE Computer Magazine, May 2005.
    • M. R. et al. Virtual machine monitors: Current technology and future trends. In IEEE Computer Magazine, May 2005.
  • 13
    • 33645079896 scopus 로고    scopus 로고
    • M. S. et al. Towards seamless mobility on pervasive hardware. Pervasive and Mobile Computing, 1(2), June 2005.
    • M. S. et al. Towards seamless mobility on pervasive hardware. Pervasive and Mobile Computing, 1(2), June 2005.
  • 14
    • 46449114239 scopus 로고    scopus 로고
    • M. V. et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In SOSP, October 2005.
    • M. V. et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In SOSP, October 2005.
  • 15
    • 46449107182 scopus 로고    scopus 로고
    • P. B. et al. Xen and the art of virtualization. In SOSP, October 2003.
    • P. B. et al. Xen and the art of virtualization. In SOSP, October 2003.
  • 16
    • 77958484343 scopus 로고    scopus 로고
    • P. S.-M. et al. Scylla: A smart virtual machine for mobile embedded systems. In WMCSA, December 2000.
    • P. S.-M. et al. Scylla: A smart virtual machine for mobile embedded systems. In WMCSA, December 2000.
  • 17
    • 46449103719 scopus 로고    scopus 로고
    • R. C. et al. Reincarnating PCs with portable soulpads. In MobiSys, June 2005.
    • R. C. et al. Reincarnating PCs with portable soulpads. In MobiSys, June 2005.
  • 18
    • 85077373727 scopus 로고    scopus 로고
    • S. T. K. et al. Debugging operating systems with time-traveling virtual machines. In USENIX, April 2005.
    • S. T. K. et al. Debugging operating systems with time-traveling virtual machines. In USENIX, April 2005.
  • 20
    • 85080362568 scopus 로고    scopus 로고
    • A Virtual Machine Introspection Based Architecture for Intrusion Detection
    • February
    • T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS, February 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 21
    • 11244321489 scopus 로고    scopus 로고
    • The changing uses of a mature campus-wide wireless network
    • September
    • T. Henderson and et al. The changing uses of a mature campus-wide wireless network. In MobiCom, September 2004.
    • (2004) MobiCom
    • Henderson, T.1    and et, al.2
  • 22
    • 0036953938 scopus 로고    scopus 로고
    • P. Levis and D. Culler. Maté: A tiny virtual machine for sensor networks. In ASPLOS, October 2002.
    • P. Levis and D. Culler. Maté: A tiny virtual machine for sensor networks. In ASPLOS, October 2002.
  • 23
    • 46449139152 scopus 로고    scopus 로고
    • The BlueBag: A mobile, covert blue-tooth attack and infection device
    • August
    • C. Mertoni and et al. The BlueBag: a mobile, covert blue-tooth attack and infection device. In Blackhat, August 2006.
    • (2006) Blackhat
    • Mertoni, C.1    and et, al.2
  • 24
    • 33751069196 scopus 로고    scopus 로고
    • NetTop: Commercial Technology in High Assurance Applications
    • September
    • R. Meushaw and D. Simard. NetTop: Commercial Technology in High Assurance Applications. Tech Trend Notes, 9(4), September 2000.
    • (2000) Tech Trend Notes , vol.9 , Issue.4
    • Meushaw, R.1    Simard, D.2
  • 26
    • 46449117282 scopus 로고    scopus 로고
    • TRANGO systems
    • TRANGO systems. http://www.trango-systems.com.
  • 27
    • 0042014530 scopus 로고    scopus 로고
    • Random waypoint considered harmful
    • April
    • J. Yoon, M. Liu, and B. Noble. Random waypoint considered harmful. In INFOCOM, April 2003.
    • (2003) INFOCOM
    • Yoon, J.1    Liu, M.2    Noble, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.