A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Analysis of I/O And Syscalls In Critical Sections And Their Implications For Transactional Memory
2008
ISPASS 2008 - IEEE International Symposium on Performance Analysis of Systems and software
Further, the absence of transactional workloads makes it difficult to study this aspect In this paper, we characterize the usage of I/O, and in particular system calls, within critical sections in two ...
We also find that while side-effecting critical sections are rare, they tend to be quite long-lasting, and that many of these critical sections perform their first syscall (and thus become side-effecting ...
Side-Effects in Critical Sections For our analysis, we sought out large, complex, multithreaded programs in which I/O and other side-effects is reasonably expected. ...
doi:10.1109/ispass.2008.4510738
dblp:conf/ispass/BaughZ08
fatcat:kadb7jyn4zgbxkfuplxca3zdpa
HyperDbg: Reinventing Hardware-Assisted Debugging
[article]
2022
arXiv
pre-print
Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. ...
In this paper, we present HyperDbg, a new hypervisor-assisted debugger for high-performance and stealthy debugging of user and kernel applications. ...
The user can monitor each x86 I/O port separately for port mapped I/O (PMIO) devices and use EPT to monitor Memory Mapped I/O (MMIO) devices. ...
arXiv:2207.05676v1
fatcat:2u2ufrmfmveg7dscvf7q3zvjae
However, SGX lacks support for generic trusted I/O paths to protect user input and output between enclaves and I/O devices. ...
This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I ...
Acknowledgments This work was partially supported by the TU Graz LEAD project "Dependable Internet of Things in Adverse Environments". ...
doi:10.1145/3029806.3029822
dblp:conf/codaspy/WeiserW17
fatcat:gs5qrfd7cbdmziwrzwgffg73gq
Concurrent and consistent virtual machine introspection with hardware transactional memory
2014
2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)
, malware analysis and memory forensic analysis. ...
In this paper, we propose a novel approach, called TxIntro, which retrofits hardware transactional memory (HTM) for concurrent, timely and consistent introspection of guest VMs. ...
Acknowledgement We thank Sylvain Geneves and the anonymous reviewers for their insightful comments. ...
doi:10.1109/hpca.2014.6835951
dblp:conf/hpca/LiuXGZC14
fatcat:wcai2c5ytjajnmzjb3jsciy7wa
SGXJail: Defeating Enclave Malware via Confinement
2019
International Symposium on Recent Advances in Intrusion Detection
To overcome this asymmetry, we design SGXJail, an enclave compartmentalization mechanism making use of flexible memory access policies. ...
and applications. ...
Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding parties. ...
dblp:conf/raid/WeiserMSG19
fatcat:f4xwe4zmjzcdniz3gocvxs4v6e
PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
2020
USENIX Security Symposium
We identify that despite providing strong intra-process memory isolation, existing, general purpose approaches neglect the ways in which the OS makes memory and other intra-process resources accessible ...
Finally, we discuss potential mitigations and show that the performance cost of extending a ptrace-based sandbox to prevent the new attacks is high, highlighting the need for more efficient system call ...
Future work could further explore the gap between secure system design abstractions and real-world systems by evaluating similar works that create new trust boundaries in an existing system. ...
dblp:conf/uss/ConnorMSS20
fatcat:5i5yqfnky5ewxoagdy45frd7vm
FlexSC: Flexible System Call Scheduling with Exception-Less System Calls
2010
USENIX Symposium on Operating Systems Design and Implementation
We present FlexSC, an implementation of exceptionless system calls in the Linux kernel, and an accompanying user-mode thread package (FlexSC-Threads), binary compatible with POSIX threads, that translates ...
They improve processor efficiency by enabling flexibility in the scheduling of operating system work, which in turn can lead to significantly increased temporal and spacial locality of execution in both ...
Special thanks to Ioana Burcea for encouraging the work in its early stages, and the Computer Systems Lab members (University of Toronto), as well as Benjamin Gamsa, for insightful comments on the work ...
dblp:conf/osdi/SoaresS10
fatcat:wcn2657cvjgula7tww2kbjeowe
2006 IEEE Symposium on Security and Privacy
2006
2006 IEEE Symposium on Security and Privacy (S&P'06)
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program. ...
Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory. ...
We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS. ...
doi:10.1109/sp.2006.20
fatcat:gutozsr4avfwpgpkvrwa4a77fu
TxBox: Building Secure, Efficient Sandboxes with System Transactions
2011
2011 IEEE Symposium on Security and Privacy
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program. ...
Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory. ...
We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS. ...
doi:10.1109/sp.2011.33
dblp:conf/sp/JanaPS11
fatcat:thlvosrksjdbfnqn7k6aexkefi
1987 IEEE Symposium on Security and Privacy
1986
Computer
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program. ...
Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory. ...
We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS. ...
doi:10.1109/mc.1986.1663102
fatcat:cduvzxwakjfyxjqlvejzyhdyym
1987 IEEE Symposium on Security and Privacy
1986
Computer
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program. ...
Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory. ...
We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS. ...
doi:10.1109/mc.1986.1663329
fatcat:u33ipffhdvhzxnmwjwqx4p3xvq
1988 IEEE Symposium on Security and Privacy
1987
Computer
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program. ...
Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory. ...
We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS. ...
doi:10.1109/mc.1987.1663423
fatcat:p76ekk6airaxdariqes2bfucey
1987 IEEE Symposium on Security and Privacy
1986
Computer
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program. ...
Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory. ...
We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS. ...
doi:10.1109/mc.1986.1663073
fatcat:wvh5tdhog5clrhdrom2tjgv2my
Dynamic Binary Translation for SGX Enclaves
2022
ACM Transactions on Privacy and Security
Instruction-level interposition offers a general foundation for implementing a large variety of inline security monitors in the future. ...
We draw attention to 5 design decisions in SGX that create fundamental trade-offs between performance and ensuring complete interposition, and we explain how to resolve them in the favor of complete interposition ...
ACKNOWLEDGMENTS We thank David Kohlbrenner, Zhenkai Liang, and Roland Yap for their feedback on improving earlier drafts of the paper. ...
doi:10.1145/3532862
fatcat:e6f3b3wf4zcprknmzwzxbnfrre
Performance analysis of NVMe SSDs and their implication on real world databases
2015
Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15
NVMe drives are expected to be particularly beneficial for I/O intensive applications, with databases being one of the prominent use-cases. ...
Non Volatile Memory Express (NVMe) based solid state devices are the latest development in this domain, delivering unprecedented performance in terms of latency and peak bandwidth. ...
In Section 3, we use synthetic benchmarks to stress-test the drives and provide an in-depth analysis of their performance. ...
doi:10.1145/2757667.2757684
dblp:conf/systor/XuSGSAGSB15
fatcat:smkzbemjxjfbte3h2kyaj5jkdy
« Previous
Showing results 1 — 15 out of 126 results