497,959 Hits in 2.4 sec

Multi-Variant Execution Research of Software Diversity

Zhenwu Liu, Zheng Zhang, Jiexin Zhang, Hao Liu
2019 Journal of Physics, Conference Series  
Finally, the reasons for the false negatives and false positives of attack events are analyzed, and the prospects and challenges of using multi-variant execution techniques to implement security systems  ...  As a software security protection technology, software diversification introduces uncertainty into the target program and provides probabilistic protection for the target program.  ...  Acknowledgments The authors thank Jiexin Zhang for his assistance and encouragement in this research.  ... 
doi:10.1088/1742-6596/1325/1/012107 fatcat:5xo7gqyy5zgl7otewo64wgstg4

Design and Development of a Run-Time Monitor for Multi-Core Architectures in Cloud Computing

Mikyung Kang, Dong-In Kang, Stephen P. Crago, Gyung-Leen Park, Junghoon Lee
2011 Sensors  
resources for multi-core architectures.  ...  By using multiple cores at a lower frequency, and consequently lower voltage, multi-core architectures can achieve higher performance with lower power consumption.  ...  For example, a program may set up a performance counter to monitor cache misses at the beginning of a program, let the program execute normally for many seconds, and then read the results of the counter  ... 
doi:10.3390/s110403595 pmid:22163811 pmcid:PMC3231313 fatcat:c26ngnu2afffhix5ok4pyjw2gm

Guest Editorial: Multi-Core Embedded Computing for Signal Processing

Shang-Hong Lai, Jenq-Kuen Lee, Branislav Kisacanin
2014 Journal of Signal Processing Systems  
For the third paper in the category of system and programming tools, "Design Issues in a Performance Monitor for Multi-core Embedded Systems", authored by Lin et al., presents a multi-core performance  ...  There are three papers related to the system and programming tools for multi-core embedded computing in this special issue.  ... 
doi:10.1007/s11265-014-0882-3 fatcat:rhzymtgtgjbxvj4uu7srxaggye

Multi-variant program execution for vulnerability detection and analysis

Todd Jackson, Christian Wimmer, Michael Franz
2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10  
A monitoring agent, or monitor, is responsible for performing the checks and ensuring that no program instance has been corrupted.  ...  Multi-variant execution allows for the creation of a system that is an effective honeypot.  ... 
doi:10.1145/1852666.1852708 dblp:conf/csiirw/JacksonWF10 fatcat:e5oiu2dbovfclbmscphf6ct7ra

Computerized anesthesia monitoring system using a high performance engineering work station. Introduction of the system and programming
高性能エンジニアリングワークステーションを利用した麻酔モニタリングシステム システムの構成とプログラム作成

Katsuyuki KATAYAMA, Mikio OHNO, Mitsuo UEDA, Osamu KEMMOTSU
Computerized Anesthesia Monitoring System Using a High Performance Engineering Work Station -introduction of the system and programming-Katsuyuki KATAYAMA*, Mikio OHNO**, Mitsuo UEDA*, Osamu KEMMOTSU**  ...  As a computerized anesthesia monitoring system, we have made the following system; 1) automated records for various patient's data, 2) real time supervision over anesthetized patients in other rooms, 3  ... 
doi:10.2199/jjsca.10.284 fatcat:ysnmtjusgvb2nkno2s4upo2lte

Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities

Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz
2008 2008 International Conference on Complex, Intelligent and Software Intensive Systems  
During regular execution each instance performs equivalent computations.  ...  codes for the popular Apache web server.  ...  Multi-Variant Parallel Execution During the multi-variant parallel execution of a program, a monitor is responsible for distributing program input over all parallel instances, synchronizing the behavior  ... 
doi:10.1109/cisis.2008.136 dblp:conf/cisis/SalamatGJMWF08 fatcat:g6kzwkhuvje6vgqtq2o22scbry

Runtime Defense against Code Injection Attacks Using Replicated Execution

B Salamat, T Jackson, G Wagner, C Wimmer, M Franz
2011 IEEE Transactions on Dependable and Secure Computing  
The empirical results demonstrate that dual-variant execution has on average 17% performance overhead when deployed on multi-core processors.  ...  Multi-variant execution is an intrusion detection mechanism that executes several slightly different versions, called variants, of the same program in lockstep.  ...  A monitoring agent, or monitor, is responsible for performing the checks and ensuring that no program instance has been corrupted.  ... 
doi:10.1109/tdsc.2011.18 fatcat:okwhqckz3zfs3b33ez6selz7zy


Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz
2009 Proceedings of the fourth ACM european conference on Computer systems - EuroSys '09  
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep.  ...  The results show that the overall penalty of simultaneous execution and monitoring of two variants on a multi-core system averages about 15% relative to unprotected conventional execution.  ...  Acknowledgments We would like to thank Gernot Heiser for his valuable advice in preparing the final version of the paper. We also thank Christian Wimmer for his thoughtful feedback on this paper.  ... 
doi:10.1145/1519065.1519071 dblp:conf/eurosys/SalamatJGF09 fatcat:mmvpcn7l35cv3doxxuye2uv254

Execution of Critical Application in Corrupted Environment Using Vmm

S. Valarmathi
2013 IOSR Journal of Computer Engineering  
The proposed system is applied for military application, hospitals, and colleges and for all critical applications.  ...  by using Virtual Machine Monitor (VMM).  ...  The results show that the overall performance of fast execution and monitoring of two variants on a multi core system to unprotected conventional execution.  ... 
doi:10.9790/0661-0931115 fatcat:we62yfjbard2dbako33xs4zsxu

GHUMVEE: Efficient, Effective, and Flexible Replication [chapter]

Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere
2013 Lecture Notes in Computer Science  
We present GHUMVEE, a multi-variant execution engine for software intrusion detection.  ...  Because of that design decision, GHUMVEE can handle complex, multi-threaded real-life programs that display non-deterministic behavior as a result of non-deterministic thread scheduling and as a result  ...  of programs with non-deterministic behavior can actually perform different system calls in different replicae.  ... 
doi:10.1007/978-3-642-37119-6_17 fatcat:k345noiupfdkhl47ssq36mdbou

Research on Web Server Application on Multi-core Embedded System

Jianfeng Yang, Yinbo Xie, Tianzhou Chen
2009 2009 International Conference on Embedded Software and Systems  
This paper presents a Web Server application based on multicore embedded system for monitoring instance, the system was run on the eCos embedded Operation System and composed of the embedded Intel atom  ...  performance than ever before. keywords: Embedded Web Server, Multi-core, Intel Atom, eCos OS 2009 International Conferences on Embedded Software and Systems 978-0-7695-3678-1/09 $25.00  ...  System Structure The web server application system for monitoring based on multi-core platform was composed of two major com- Figure 1 .  ... 
doi:10.1109/icess.2009.78 dblp:conf/icess/YangXC09 fatcat:px6ticczx5b27l3fid53xwvmha

PLC–HMI and Ethernet based Monitoring and Control of Mimo System in a Petrochemical Industry

A. Selwin Mich Priyadharson, S. Vinson Joshua, C. ThilipKumar
2015 Indian Journal of Science and Technology  
safety and performs online monitoring and control.  ...  Output) system in a petro-chemical industry.  ...  The monitoring and control action is performed for the process variables temperature, flow and level.  ... 
doi:10.17485/ijst/2015/v8i27/72100 fatcat:2lz2qq4e6fhkfbfamy2kckar5m

Precise Enforcement of Confidentiality for Reactive Systems

Dante Zanarini, Mauro Jaskelioff, Alejandro Russo
2013 2013 IEEE 26th Computer Security Foundations Symposium  
for reactive systems.  ...  Using this scheduler, we introduce a novel combination between monitoring and SME, called multi-execution monitor, which raises alarms only for actions breaking the non-interference notion of ID-security  ...  Acknowledgments: We thank David Sands for suggesting a more appropriate reference to his work and the anonymous reviewers for insightful comments and bringing several references to our attention.  ... 
doi:10.1109/csf.2013.9 dblp:conf/csfw/ZanariniJR13 fatcat:ee6gazmidnf25ee2w2kl3jfjga

Page 85 of Behavior Research Methods Vol. 7, Issue 2 [page]

1975 Behavior Research Methods  
ISSUE 7: PERFORMANCE EVALUATION The last major issue is how to analyze and evaluate the performance of running systems on a multi-mini-processor.  ...  Traditionally, the analysis of performance of a computer system or a program is undertaken as a study.  ... 

Improving developers' confidence in test results of multi-threaded systems

Ayla Dantas
2008 Companion to the 23rd ACM SIGPLAN conference on Object oriented programming systems languages and applications - OOPSLA Companion '08  
With this work, we want to support tests development through an approach to avoid test failures caused by a common problem with multi-threaded systems testing: assertions performed too early or too late  ...  Testing multi-threaded systems is challenging, especially due to their inherent non-determinism.  ...  Motivation Multi-threaded systems are becoming more and more popular, especially with the advent of multicore processors.  ... 
doi:10.1145/1449814.1449898 dblp:conf/oopsla/Dantas08 fatcat:vmukkpmnzffilaeus4wedw2e5m
« Previous Showing results 1 — 15 out of 497,959 results