期刊文献+

一种基于Petri网的虚拟机性能分析方法

A Method of Performance Analysis for Loader in Virtual Machine Based on Petri-net
下载PDF
导出
摘要 虚拟机技术在缓冲区溢出防御方面有着重要的应用,虚拟机系统中加载器的不同设计方案直接影响虚拟机的运行效率。本文提出一种使用Petri网形式化建模的方法,对虚拟机所需要的加载方案实现形式化建模和评估。使用CPN-Tools工具进行验证结果显示,该方法可以有效地分析虚拟机模型的性质,实现各种加载方案的虚拟机系统的时间和空间量化比较。 Virtual machine has been widely applied in computer security.The loader scheme can make different affection on VM running.This paper proposes a method to make the VM model with Petri-net.By this method the model can be formalized for different loader scheme to VM,and the performance can be evaluated.The experiments by CPN-tools show that this method can analyze some characters for model and can compare consume for time and space among these schemes effectively.
出处 《计算机与现代化》 2011年第10期193-195,198,共4页 Computer and Modernization
关键词 PETRI网 虚拟机 加载器 Petri-net virtual machine loader
  • 相关文献

参考文献14

  • 1Stuart E Madnick,John J Donovan.Application and analysis of the virtual machine approach to information system security and isolation[C]//Proceedings of the Workshop on Virtual Computer Systems.United States,1973:132-156.
  • 2Clark Weissman.Secure computer operation with virtual machine partitioning[C]//AFIPS Joint Computer Conferences.United States,1975:4413-4451.
  • 3Aleph One.Smashing the stack for fun and profit[J].Phrack,1996,7(49):14-16.
  • 4Fayolle Pierre-alain,Glaume Vincent.A buffer overflow study:Attacks & defenses[J].Networks and Distributed Systems,2002(4):41-45.
  • 5王伟兵.现代木马技术的分析与研究[J].网络安全技术与应用,2005(10):22-25. 被引量:6
  • 6李肖坚 夏冰 钟达夫.一种基于虚拟机技术的缓冲区溢出防御方案.计算机应用研究,(5):51-57.
  • 7Xiaoqi Lu,Pscott F Smith.A microkernel virtual machine:Building security with clear interfaces[C]//Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security.Canada,2006:980-983.
  • 8陈英.构建基于动态二进制翻译技术的进程虚拟机[D].上海:上海交通大学,2007.
  • 9黄亭宇,张琼声,夏守姬.系统虚拟机实现技术综述[J].农业网络信息,2007(10):201-204. 被引量:5
  • 10Blunden B.虚拟机的设计与实现:C/C++[M].杨涛,杨晓云,高文雅,等译.北京:北京机械工业出版社,2003:211-234.

二级参考文献13

  • 1庄颖杰.新型木马技术的研究与分析[J].计算机工程,2004,30(B12):318-319. 被引量:4
  • 2阿锐.现代版特洛伊反木马大战[J].网络与信息,2003,17(3):96-97. 被引量:2
  • 3ARM Limited.ARM Architecture Reference Manual.
  • 4Karim Yaghmour.Building Embedded Linux Systems.O'Reilly Publisher.
  • 5任爱华.操作系统使用教程.北京:清华大学出版社,2001(8).
  • 6宋振宇,王利明.Arm linux 启动分析.
  • 7Alessandro Rubini.linux device driver.2nd Edition.O'Reilly Publisher.
  • 8Matthias Kalle Dalheimer.Running Linux 4th Edition.O'Reilly Publisher.
  • 9.System/370 extended architecture:facilities for virtual machines[].IBM Journal of Research and Development.1983
  • 10.Xen and the Art of Virtualization[].Proceedings of the th ACM Symposium onOperating Systems Principles.2003

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部