Eighth IEEE Workshop on Mobile Computing Systems and Applications 2007
DOI: 10.1109/hotmobile.2007.20
|View full text |Cite
|
Sign up to set email alerts
|

Pocket Hypervisors: Opportunities and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
9
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 1 publication
1
9
0
Order By: Relevance
“…System-level virtualization of mobile devices has been proposed and implemented by both researchers [5,8,3] and commercial entities [6,12]. We agree with their conclusions that virtualization improves the security and manageability of mobile computing, and add our insight that virtualization would also enable seamless switching between devices.…”
Section: Related Worksupporting
confidence: 74%
See 1 more Smart Citation
“…System-level virtualization of mobile devices has been proposed and implemented by both researchers [5,8,3] and commercial entities [6,12]. We agree with their conclusions that virtualization improves the security and manageability of mobile computing, and add our insight that virtualization would also enable seamless switching between devices.…”
Section: Related Worksupporting
confidence: 74%
“…This paper proposes VMsync, a system for synchronizing the state of live virtual machines (VMs) among mobile devices. System-level VMs have been widely proposed to improve the security, manageability, and other aspects of mobile computing [3,5,6,8,12]. In the context of device switching, VMs encapsulate both data and computation state for a complete operating system and all its applications.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have also explored the use of on-device virtualization for mobile security applications [2]. In our prior work, we demonstrate that while the effectiveness of desktop antivirus is inadequate against modern threats [12], a virtualized in-cloud network service [13] fares much better.…”
Section: Related Workmentioning
confidence: 99%
“…In this section we describe three enabling technologies on which our JellyNet architecture relies: programmable consumer devices, pocket hypervisors [10], and Virtual WiFi [6].…”
Section: Introductionmentioning
confidence: 99%
“…To this end, JellyNets rely on autonomous pocket hypervisors [10] to export a virtualized hardware interface to developers and manage devices' physical resources. Pocket hypervisors are identical to desktop hypervisors like Xen and VMware in most ways, but they provide an extended interface to support virtualized wireless communication (e.g., WiFi and Bluetooth), and they contain additional mechanisms and policies to ensure power isolation.…”
Section: Introductionmentioning
confidence: 99%