Filters








126 Hits in 9.7 sec

An Analysis of I/O And Syscalls In Critical Sections And Their Implications For Transactional Memory

Lee Baugh, Craig Zilles
2008 ISPASS 2008 - IEEE International Symposium on Performance Analysis of Systems and software  
Further, the absence of transactional workloads makes it difficult to study this aspect In this paper, we characterize the usage of I/O, and in particular system calls, within critical sections in two  ...  We also find that while side-effecting critical sections are rare, they tend to be quite long-lasting, and that many of these critical sections perform their first syscall (and thus become side-effecting  ...  Side-Effects in Critical Sections For our analysis, we sought out large, complex, multithreaded programs in which I/O and other side-effects is reasonably expected.  ... 
doi:10.1109/ispass.2008.4510738 dblp:conf/ispass/BaughZ08 fatcat:kadb7jyn4zgbxkfuplxca3zdpa

HyperDbg: Reinventing Hardware-Assisted Debugging [article]

Mohammad Sina Karvandi, MohammadHossein Gholamrezaei, Saleh Khalaj Monfared, Suorush Medi, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz
2022 arXiv   pre-print
Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis.  ...  In this paper, we present HyperDbg, a new hypervisor-assisted debugger for high-performance and stealthy debugging of user and kernel applications.  ...  The user can monitor each x86 I/O port separately for port mapped I/O (PMIO) devices and use EPT to monitor Memory Mapped I/O (MMIO) devices.  ... 
arXiv:2207.05676v1 fatcat:2u2ufrmfmveg7dscvf7q3zvjae

SGXIO

Samuel Weiser, Mario Werner
2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17  
However, SGX lacks support for generic trusted I/O paths to protect user input and output between enclaves and I/O devices.  ...  This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I  ...  Acknowledgments This work was partially supported by the TU Graz LEAD project "Dependable Internet of Things in Adverse Environments".  ... 
doi:10.1145/3029806.3029822 dblp:conf/codaspy/WeiserW17 fatcat:gs5qrfd7cbdmziwrzwgffg73gq

Concurrent and consistent virtual machine introspection with hardware transactional memory

Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang, Haibo Chen
2014 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)  
, malware analysis and memory forensic analysis.  ...  In this paper, we propose a novel approach, called TxIntro, which retrofits hardware transactional memory (HTM) for concurrent, timely and consistent introspection of guest VMs.  ...  Acknowledgement We thank Sylvain Geneves and the anonymous reviewers for their insightful comments.  ... 
doi:10.1109/hpca.2014.6835951 dblp:conf/hpca/LiuXGZC14 fatcat:wcai2c5ytjajnmzjb3jsciy7wa

SGXJail: Defeating Enclave Malware via Confinement

Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss
2019 International Symposium on Recent Advances in Intrusion Detection  
To overcome this asymmetry, we design SGXJail, an enclave compartmentalization mechanism making use of flexible memory access policies.  ...  and applications.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding parties.  ... 
dblp:conf/raid/WeiserMSG19 fatcat:f4xwe4zmjzcdniz3gocvxs4v6e

PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems

R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
2020 USENIX Security Symposium  
We identify that despite providing strong intra-process memory isolation, existing, general purpose approaches neglect the ways in which the OS makes memory and other intra-process resources accessible  ...  Finally, we discuss potential mitigations and show that the performance cost of extending a ptrace-based sandbox to prevent the new attacks is high, highlighting the need for more efficient system call  ...  Future work could further explore the gap between secure system design abstractions and real-world systems by evaluating similar works that create new trust boundaries in an existing system.  ... 
dblp:conf/uss/ConnorMSS20 fatcat:5i5yqfnky5ewxoagdy45frd7vm

FlexSC: Flexible System Call Scheduling with Exception-Less System Calls

Livio Soares, Michael Stumm
2010 USENIX Symposium on Operating Systems Design and Implementation  
We present FlexSC, an implementation of exceptionless system calls in the Linux kernel, and an accompanying user-mode thread package (FlexSC-Threads), binary compatible with POSIX threads, that translates  ...  They improve processor efficiency by enabling flexibility in the scheduling of operating system work, which in turn can lead to significantly increased temporal and spacial locality of execution in both  ...  Special thanks to Ioana Burcea for encouraging the work in its early stages, and the Computer Systems Lab members (University of Toronto), as well as Benjamin Gamsa, for insightful comments on the work  ... 
dblp:conf/osdi/SoaresS10 fatcat:wcn2657cvjgula7tww2kbjeowe

2006 IEEE Symposium on Security and Privacy

2006 2006 IEEE Symposium on Security and Privacy (S&P'06)  
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program.  ...  Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/sp.2006.20 fatcat:gutozsr4avfwpgpkvrwa4a77fu

TxBox: Building Secure, Efficient Sandboxes with System Transactions

Suman Jana, Donald E. Porter, Vitaly Shmatikov
2011 2011 IEEE Symposium on Security and Privacy  
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program.  ...  Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/sp.2011.33 dblp:conf/sp/JanaPS11 fatcat:thlvosrksjdbfnqn7k6aexkefi

1987 IEEE Symposium on Security and Privacy

1986 Computer  
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program.  ...  Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1986.1663102 fatcat:cduvzxwakjfyxjqlvejzyhdyym

1987 IEEE Symposium on Security and Privacy

1986 Computer  
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program.  ...  Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1986.1663329 fatcat:u33ipffhdvhzxnmwjwqx4p3xvq

1988 IEEE Symposium on Security and Privacy

1987 Computer  
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program.  ...  Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1987.1663423 fatcat:p76ekk6airaxdariqes2bfucey

1987 IEEE Symposium on Security and Privacy

1986 Computer  
In Section VI, we show how to use TXBOX to execute an antivirus scan in parallel with the speculative execution of an untrusted program.  ...  Its kernel-based enforcement mechanism prevents exploitation of incorrect mirroring of the kernel 1 System transactions are not transactional memory.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1986.1663073 fatcat:wvh5tdhog5clrhdrom2tjgv2my

Dynamic Binary Translation for SGX Enclaves

Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan
2022 ACM Transactions on Privacy and Security  
Instruction-level interposition offers a general foundation for implementing a large variety of inline security monitors in the future.  ...  We draw attention to 5 design decisions in SGX that create fundamental trade-offs between performance and ensuring complete interposition, and we explain how to resolve them in the favor of complete interposition  ...  ACKNOWLEDGMENTS We thank David Kohlbrenner, Zhenkai Liang, and Roland Yap for their feedback on improving earlier drafts of the paper.  ... 
doi:10.1145/3532862 fatcat:e6f3b3wf4zcprknmzwzxbnfrre

Performance analysis of NVMe SSDs and their implication on real world databases

Qiumin Xu, Huzefa Siyamwala, Mrinmoy Ghosh, Tameesh Suri, Manu Awasthi, Zvika Guz, Anahita Shayesteh, Vijay Balakrishnan
2015 Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15  
NVMe drives are expected to be particularly beneficial for I/O intensive applications, with databases being one of the prominent use-cases.  ...  Non Volatile Memory Express (NVMe) based solid state devices are the latest development in this domain, delivering unprecedented performance in terms of latency and peak bandwidth.  ...  In Section 3, we use synthetic benchmarks to stress-test the drives and provide an in-depth analysis of their performance.  ... 
doi:10.1145/2757667.2757684 dblp:conf/systor/XuSGSAGSB15 fatcat:smkzbemjxjfbte3h2kyaj5jkdy
« Previous Showing results 1 — 15 out of 126 results