Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones
暂无分享,去创建一个
Sang-Bum Suh | Joo-Young Hwang | Sung-Kwan Heo | Chan-Ju Park | Jae-Min Ryu | Seong-Yeol Park | Chul-Ryun Kim | J. Hwang | Sang-Bum Suh | Sung-kwan Heo | Chan-Ju Park | Jae-Min Ryu | Seong-Yeol Park | Chul-Ryun Kim
[1] Gernot Heiser,et al. Implementation of Fast Address-Space Switching and TLB Sharing on the StrongARM Processor , 2003, Asia-Pacific Computer Systems Architecture Conference.
[2] Sung-Min Lee,et al. A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[3] David Seal,et al. ARM Architecture Reference Manual , 2001 .
[4] Andrew N. Sloss,et al. ARM System Developer's Guide: Designing and Optimizing System Software , 2004 .
[5] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[6] Gernot Heiser,et al. High-performance microkernels and virtualisation on ARM and segmented architectures , 2007 .
[7] Gernot Heiser,et al. Wombat: A portable user-mode Linux for embedded systems , 2005 .
[8] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[9] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[10] Tal Garfinkel,et al. Virtual machine monitors: current technology and future trends , 2005, Computer.
[11] Laszlo A. Belady,et al. A Study of Replacement Algorithms for Virtual-Storage Computer , 1966, IBM Syst. J..
[12] Daniel R. Ferstay,et al. Fast Secure Virtualization for the ARM Platform , 2006 .