Observation or Interference?
نویسندگان
چکیده
A t one time, desktop computers were “one machine, one operating system, one application,” forcing users to close one application to open another—and often to spend more time waiting than doing as a result. The advent of “one machine, one operating system, many applications” let users run multiple programs simultaneously and introduced a major step forward in computational evolution. Today, virtualization lets users have “one machine, multiple operating systems, multiple applications” and switch between them at will. This not only lets developers easily test their programs on multiple OSs and enterprise users more effectively utilize hardware through server consolidation, it’s also useful to computer users in general. When virtual machines are distributed with a set of preconfigured applications, users can easily utilize complex applications. Further, the isolation offered by VMs provides some security benefit, such as allowing general Web browsing while reducing the risk of compromise to the underlying physical system. Although virtualization isn’t new, the recent development of x86 virtualization products has revived interest in the virtualization market. This has led to the evolution of virtual machine introspection (VMI) techniques and tools to monitor VM behavior. VMI tools inspect a VM from the outside to assess what’s happening on the inside. This makes it possible for security tools—such as virus scanners and intrusion detection systems—to observe and respond to VM events from a “safe” location outside the monitored machine. Here, we survey and categorize the current crop of VMI technologies, then offer a detailed description of the Virtual Introspection for Xen (VIX) tool suite, which addresses key VMI requirements.
منابع مشابه
Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
متن کاملAtypical interference effect of action observation in autism spectrum conditions
BACKGROUND Observing incongruent actions interferes with ongoing action execution. This 'interference effect' is larger for observed biological actions than for non-biological actions. The current study used virtual reality to investigate the biological specificity of interference effects of action observation in autism spectrum conditions (ASC). METHOD High-functioning adults with ASC and ag...
متن کاملInterference in laboratory tests
Interference in clinical laboratory testing can create discrepancies in test results which can lead to patient harm. In clinical chemistry, interference is defined as a cause of medically significant difference in the measurand test result due to another component or property of the sample. Interference by endogenous and exogenous substances with assays for clinical analytes is a common prob...
متن کاملEffects of Agency on Movement Interference During Observation of a Moving Dot Stimulus
Human movement performance is subject to interference if the performer simultaneously observes an incongruent action. It has been proposed that this phenomenon is due to motor contagion during simultaneous movement performance-observation, with coactivation of shared action performance and action observation circuitry in the premotor cortex. The present experiments compared the interference eff...
متن کاملDesigning software to estimate the relative interference between multiple tasks and determine its validity
The most commonly used empirical approach to address issues of attention constraint is evaluate the degree of interference in dual or multiple tasks. The purpose of this study was designing software to estimate the relative interference between multiple tasks and determine its validity in performance prediction of simultaneous multiple tasks. in order to assess the validity of software, 46 stud...
متن کاملAn Interference Effect of Observed Biological Movement on Action
It has been proposed that actions are intrinsically linked to perception and that imagining, observing, preparing, or in any way representing an action excites the motor programs used to execute that same action. There is neurophysiological evidence that certain brain regions involved in executing actions are activated by the mere observation of action (the so-called "mirror system;" ). However...
متن کامل