2016 International Conference on Computing, Communication and Automation (ICCCA) 2016
DOI: 10.1109/ccaa.2016.7813908
|View full text |Cite
|
Sign up to set email alerts
|

A study report on virtualization technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 46 publications
0
2
0
Order By: Relevance
“…State [1] State [ [3] State [1] State [x] State [1] State [2] State [2] State [2] State [3] New states/branches New states/branches New states/branches New states/branches New states/branches Wireless Communications and Mobile Computing insertion, and segmentation. In order to reduce the memory resource consumption of fuzzing, we only save the changed parts of key structure corresponding to the high-value testcases, not the entire structure (4) Fuzzing front-end.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…State [1] State [ [3] State [1] State [x] State [1] State [2] State [2] State [2] State [3] New states/branches New states/branches New states/branches New states/branches New states/branches Wireless Communications and Mobile Computing insertion, and segmentation. In order to reduce the memory resource consumption of fuzzing, we only save the changed parts of key structure corresponding to the high-value testcases, not the entire structure (4) Fuzzing front-end.…”
Section: Methodsmentioning
confidence: 99%
“…Virtualization technology can provide users with with convenient service of privilege isolation protection. It is also an effective solution to reduce the cost of configuring multiple physical computing instances [1]. In order to enable the virtualization guest machine to access essential hardware (network cards, graphics cards, sound cards, etc.…”
mentioning
confidence: 99%