2018
DOI: 10.1002/cpe.4482
|View full text |Cite
|
Sign up to set email alerts
|

SAVM: A practical secure external approach for automated in‐VM management

Abstract: Summary In‐VM management is usually needed by cloud service providers for cloud management, which includes monitoring the in‐VM application running state, reconfiguring VM system settings, etc. In‐VM management is also very useful in green cloud computing, because it provides the abilities of in‐VM monitoring, VM reconfiguration, performance measurement, etc. Leveraging a shell or an in‐VM agent to manage VMs is faced with generality and security challenges. In this paper, we propose a secure automated in‐VM m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…By converting a process within the target VM to a dummy process, ShadowContext leverages the dummy process to invoke some system calls to narrow the semantic gap automatically. SAVM [20] and HyperShell [21] are some in-VM management tools, which also leverage the system call reuse technology.…”
Section: Related Workmentioning
confidence: 99%
“…By converting a process within the target VM to a dummy process, ShadowContext leverages the dummy process to invoke some system calls to narrow the semantic gap automatically. SAVM [20] and HyperShell [21] are some in-VM management tools, which also leverage the system call reuse technology.…”
Section: Related Workmentioning
confidence: 99%
“…This issue would be incomplete without in‐VM management and it is very useful in green cloud computing because it provides the abilities of in‐VM monitoring, VM reconfiguration, and performance measurement. Zhan et al propose a secure automated in‐VM management approach, a hypervisor‐based shell managing the VMs in an out‐of‐box way. In addition, it presents a dummy process selection and a system call injection method to further enhance the system security and transparency.…”
Section: Introductionmentioning
confidence: 99%