Filters








3 Hits in 4.5 sec

Evaluating the unikernel concept for the deployment of software on IoT devices

Jan Amort, Schahram Dustdar
2018
Next this work evaluates the problems by IoT devices regarding security, takes a look at current incidents involving IoT devices and the claims of Unikernels with respect to security.  ...  This work evaluates whether Unikernels are a good fit for deployments of software on IoT devices and can contribute to the security of IoT devices by facilitating the timely rollout of new versions of  ...  It connects IoT devices to the cloud and allows a bidirectional connection sending collected data from the devices to the cloud and allowing the user to send instructions from the cloud to the connected  ... 
doi:10.34726/hss.2017.44461 fatcat:qmdxkjrgqfendbzc6eynpjgjua

Design and implementation of a Cache Mechanism for a Distributed Storage System of a Cloud Computing Environment [article]

Alexios G. Pyrgiotis, National Technological University Of Athens, National Technological University Of Athens, Νεκτάριος Κοζύρης
2014
Early performance evaluations look very promising and show that cached can improve the current Archipelago performance up to 400%.  ...  Underlying hard disks however, are usually inadequate in providing fast performance for large deployments and the storage engineers commonly have to resort in using various buffering and caching techniques  ...  So, when one synapsed accepts an XSEG request, it will translate it to a network request, send it to the synapsed peer of the other segment, who in turn will finally translate it back to an XSEG request  ... 
doi:10.26240/heal.ntua.5496 fatcat:vrir7plnlvcdbcj4ix4qqegupe

Preventing Code Reuse Attacks On Modern Operating Systems

Marios Pomonis
2020
More concretely, we present the design and implementation of two systems: kR^X and kSplitStack. kR^X is a system that diversifies the code layout to thwart attackers from constructing code reuse exploits  ...  Recently introduced hardening features prevent attackers from using traditional kernel exploitation methodologies and force them to employ techniques that were originally designed for user space exploitation  ...  measured the additional latency imposed on: (a) critical system calls, like open()/close(), read()/write(), select(), fstat(), mmap()/munmap(); (b) mode switches (i.e., user mode to kernel mode and back  ... 
doi:10.7916/d8-83r5-1c58 fatcat:zurdcl4ksvdrhcfisfghb5owxu