scispace - formally typeset
H

Hans P. Reiser

Researcher at University of Passau

Publications -  86
Citations -  813

Hans P. Reiser is an academic researcher from University of Passau. The author has contributed to research in topics: Virtual machine & Replication (computing). The author has an hindex of 14, co-authored 86 publications receiving 651 citations. Previous affiliations of Hans P. Reiser include University of Lisbon & University of Erlangen-Nuremberg.

Papers
More filters
Proceedings ArticleDOI

Hypervisor-Based Efficient Proactive Recovery

TL;DR: This paper investigates the benefits that a virtualization-based replication infrastructure can offer for implementing proactive recovery and uses the hypervisor to initialize a new replica in parallel to normal system execution and minimizes the time in which a proactive reboot interferes with system operation.
Proceedings ArticleDOI

Scaling Byzantine Consensus: A Broad Analysis

TL;DR: This paper provides a broad analysis of various optimization techniques and approaches used in recent protocols to scale Byzantine consensus for large environments such as BFT blockchain infrastructures and presents an overview of both efforts and assumptions made by existing protocols.
Journal ArticleDOI

Classifying malware attacks in IaaS cloud environments

TL;DR: This paper classifies attacks in IaaS cloud that can be investigated using VMI-based mechanisms and provides a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.
Proceedings Article

SPARE: Replicas on Hold.

TL;DR: SPARE is presented, a cloud-aware approach that harnesses virtualization to reduce the resource demand of BFT replication and to provide efficient support for proactive recovery and focuses on the main source of software bugs and intrusions.

VM-FIT: Supporting Intrusion Tolerance with Virtualisation Technology

TL;DR: The VM-FIT architecture, which uses virtualisation for realising fault and intrusion tolerant networkbased services, allows the implementation of more efficient strategies for proactive recovery in order to cope with the undetectability of malicious intrusions.