Filters








24 Hits in 1.6 sec

MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging

Guru Venkataramani, Brandyn Roemer, Yan Solihin, Milos Prvulovic
2007 2007 IEEE 13th International Symposium on High Performance Computer Architecture  
This paper describes MemTracker, a new hardware support mechanism that can be configured to perform different kinds of memory access monitoring tasks.  ...  MemTracker associates each word of data in memory with a few bits of state, and uses a programmable state transition table to react to different events that can affect this state.  ...  As a result, the same MemTracker hardware can efficiently support different detection, monitoring, and debugging tasks.  ... 
doi:10.1109/hpca.2007.346205 dblp:conf/hpca/VenkataramaniRSP07 fatcat:mszforhdmnf2hi2xq6mkd2khxe

MemTracker

Guru Venkataramani, Ioannis Doudalis, Yan Solihin, Milos Prvulovic
2009 ACM Transactions on Architecture and Code Optimization (TACO)  
This article describes MemTracker, a new hardware support mechanism that can be configured to perform different kinds of memory access monitoring tasks.  ...  MemTracker associates each word of data in memory with a few bits of state, and uses a programmable state transition table to react to different events that can affect this state.  ...  Unfortunately, architectural support for software monitoring and debugging has not kept pace with software complexity, and programmers and users still rely on software-only tools for many critical monitoring  ... 
doi:10.1145/1543753.1543754 fatcat:n3xdhxjnlbetrgoj5jf7izywve

High-performance parallel accelerator for flexible and efficient run-time monitoring

Daniel Y. Deng, G. Edward Suh
2012 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)  
We implemented an RTL prototype of Harmoni and evaluated it with several example monitoring functions for security and programmability.  ...  The Harmoni architecture achieves much higher efficiency than software implementations and previously proposed monitoring platforms by closely matching the common characteristics of run-time monitoring  ...  ACKNOWLEDGMENTS This work was partially supported by the National Science Foundation grants CNS-0746913 and CNS-0708788, the Air Force grant FA8750-11-2-0025, the Office of Naval Research grant N00014-  ... 
doi:10.1109/dsn.2012.6263925 dblp:conf/dsn/DengS12 fatcat:qdoiyu6i2fdafocud2sw3vp54u

Sentry

Arrvindh Shriraman, Sandhya Dwarkadas
2010 SIGARCH Computer Architecture News  
Unfortunately, access control in today's processors is tied to support for virtual memory, making its use both heavy weight and coarse grain.  ...  , as well as the efficiency of software debugging tools.  ...  by MemTracker [21] ), and (3) Debugging Examples Generic unbounded watching of memory can help widen the scope of debugging.  ... 
doi:10.1145/1816038.1816016 fatcat:z7igi6gfcnhx5ltu2zvez4vciy

Sentry

Arrvindh Shriraman, Sandhya Dwarkadas
2010 Proceedings of the 37th annual international symposium on Computer architecture - ISCA '10  
Unfortunately, access control in today's processors is tied to support for virtual memory, making its use both heavy weight and coarse grain.  ...  , as well as the efficiency of software debugging tools.  ...  by MemTracker [21] ), and (3) Debugging Examples Generic unbounded watching of memory can help widen the scope of debugging.  ... 
doi:10.1145/1815961.1816016 dblp:conf/isca/ShriramanD10 fatcat:etjecpyesrguhix4ehppvvhitq

Flexible and Efficient Instruction-Grained Run-Time Monitoring Using On-Chip Reconfigurable Fabric

Daniel Y. Deng, Daniel Lo, Greg Malysa, Skyler Schneider, G. Edward Suh
2010 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture  
FlexCore provides an efficient platform that can support a broad range of run-time monitoring and bookkeeping techniques.  ...  The prototypes demonstrate that the architecture can support a range of monitoring extensions with different characteristics in an efficient manner.  ...  ACKNOWLEDGMENT This work was partially supported by the National Science Foundation under grants CNS-0746913 and CNS-0708788, and an equipment donation from Intel Corporation.  ... 
doi:10.1109/micro.2010.17 dblp:conf/micro/DengLMSS10 fatcat:htxhhfdrmvfm3lwbqtlditg22i

Effective and Efficient Memory Protection Using Dynamic Tainting

Ioannis Doudalis, James Clause, Guru Venkataramani, Milos Prvulovic, Alessandro Orso
2012 IEEE transactions on computers  
Taint marks are then propagated and checked every time a memory address m is accessed through a pointer p; if the associated taint marks differ, an illegal access is reported.  ...  Programs written in languages allowing direct access to memory through pointers often contain memory-related faults, which cause nondeterministic failures and security vulnerabilities.  ...  ACKNOWLEDGMENTS This work was supported in part by US National Science Foundation (NSF) Awards CCF-0541080, CCF-0916605, and CCF-0964647 to Georgia Tech and by the Department of Homeland Security and US  ... 
doi:10.1109/tc.2010.215 fatcat:42cilvqzbrcd7jdymusg6kq3ui

Generating sound and effective memory debuggers

Yan Wang, Iulian Neamtiu, Rajiv Gupta
2013 Proceedings of the 2013 international symposium on International symposium on memory management - ISMM '13  
Experiments with using our system on 7 versions of 4 real-world programs show that our approach is expressive, effective at finding bugs and their causes, and efficient.  ...  We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code.  ...  Acknowledgments This research is supported by the National Science Foundation grants CCF-0963996 and CCF-1149632 to the University of California, Riverside.  ... 
doi:10.1145/2491894.2464159 dblp:conf/iwmm/WangNG13 fatcat:m7pbloduang7nj5hkg6zibbc34

No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains

Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha
2012 2012 15th Euromicro Conference on Digital System Design  
We propose a hardwareenforced, fine-grained memory protection mechanism to divide the process into smaller principals and multiple protection domains.  ...  Our approach supports modern software engineering better than traditional processes by enabling developers to align software components with protection mechanisms.  ...  Also MemTracker only tracks memory reads and writes and is not concerned about instruction fetches, which must be monitored to track the active principal.  ... 
doi:10.1109/dsd.2012.89 dblp:conf/dsd/LeontieBNS12 fatcat:dn3rryadrvdjbiqrcsowxd33iq

Generating sound and effective memory debuggers

Yan Wang, Iulian Neamtiu, Rajiv Gupta
2013 SIGPLAN notices  
Experiments with using our system on 7 versions of 4 real-world programs show that our approach is expressive, effective at finding bugs and their causes, and efficient.  ...  We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code.  ...  Acknowledgments This research is supported by the National Science Foundation grants CCF-0963996 and CCF-1149632 to the University of California, Riverside.  ... 
doi:10.1145/2555670.2464159 fatcat:m22ebmihlbhcxdrgktjujx2llm

A case for unlimited watchpoints

Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd Austin
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
We describe a hardware design that stores watchpoints in main memory and utilizes two different on-chip caches to accelerate performance.  ...  Numerous tools have been proposed to help developers fix software errors and inefficiencies.  ...  Acknowledgments We wish to thank Debapriya Chatterjee, Andrea Pellegrini, and the anonymous reviewers, whose suggestions greatly improved this work, as well as Evelyn Duesterwald from IBM Research, for  ... 
doi:10.1145/2150976.2150994 dblp:conf/asplos/GreathouseXLA12 fatcat:sirwrqqo4zenllc3fn2kpgps6e

A case for unlimited watchpoints

Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd Austin
2012 SIGARCH Computer Architecture News  
We describe a hardware design that stores watchpoints in main memory and utilizes two different on-chip caches to accelerate performance.  ...  Numerous tools have been proposed to help developers fix software errors and inefficiencies.  ...  Acknowledgments We wish to thank Debapriya Chatterjee, Andrea Pellegrini, and the anonymous reviewers, whose suggestions greatly improved this work, as well as Evelyn Duesterwald from IBM Research, for  ... 
doi:10.1145/2189750.2150994 fatcat:tgjib5rsabfidiwgikxdzcgjie

Demand-driven software race detection using hardware performance counters

Joseph L. Greathouse, Zhiqiang Ma, Matthew I. Frank, Ramesh Peri, Todd Austin
2011 SIGARCH Computer Architecture News  
Software race detectors instrument the program under test, observe each memory access, and watch for inter-thread data sharing that could lead to concurrency errors.  ...  × for one particular program.  ...  Thanks to Lee Baugh for his suggestions about testing RFOs, and to Debapriya Chatterjee, Jason Clemons, and Andrea Pellegrini for their edits and suggestions.  ... 
doi:10.1145/2024723.2000084 fatcat:pokfk77j3vgvvc2ywthuatdhqm

Demand-driven software race detection using hardware performance counters

Joseph L. Greathouse, Zhiqiang Ma, Matthew I. Frank, Ramesh Peri, Todd Austin
2011 Proceeding of the 38th annual international symposium on Computer architecture - ISCA '11  
Software race detectors instrument the program under test, observe each memory access, and watch for inter-thread data sharing that could lead to concurrency errors.  ...  × for one particular program.  ...  Thanks to Lee Baugh for his suggestions about testing RFOs, and to Debapriya Chatterjee, Jason Clemons, and Andrea Pellegrini for their edits and suggestions.  ... 
doi:10.1145/2000064.2000084 dblp:conf/isca/GreathouseMFPA11 fatcat:ktlxd3qsqrbqhapvgvhepq7jpa

Effective memory protection using dynamic tainting

James Clause, Ioannis Doudalis, Alessandro Orso, Milos Prvulovic
2007 Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering - ASE '07  
In this paper, we present a new technique based on dynamic tainting for protecting programs from illegal memory accesses.  ...  execution is stopped and the illegal access is reported.  ...  Acknowledgments This work was supported in part by NSF award CCF-0541080 to Georgia Tech and by the Department of Homeland Security and US Air Force under Contract No. FA8750-05-2-0214.  ... 
doi:10.1145/1321631.1321673 dblp:conf/kbse/ClauseDOP07 fatcat:ol7ucc3qnrcmfgpyvqg42hhx3i
« Previous Showing results 1 — 15 out of 24 results