1,122 Hits in 4.4 sec

Booting Linux faster

Dokeun Lee, Youjip Won
2012 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content  
Their non-volatile characteristic makes several processes in existing boot mechanism unnecessary. If these processes are eliminated, the system users can spend shorter time to control the system.  ...  In this paper, we propose a technique which uses only one kernel image for every booting by using nonvolatile memories.  ...  Boot process of Linux Booting is a process that makes CPUs, memories and other devices to initialize and operating system to run, so that the user can use the stabilized system.  ... 
doi:10.1109/icnidc.2012.6418839 dblp:conf/icnidc/LeeW12 fatcat:guiuvl4cpratrm42x3vzjgmtaq

Bootless Boot: Reducing Device Boot Latency with Byte Addressable NVRAM

Dokeun Lee, Youjip Won
2013 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing  
This technique eliminates the kernel loading, the kernel decompression, and the reallocation of a kernel image by maintaining of the linux binary image at the non-volatile random access memory.  ...  Explicit initialization module is added to the linux kernel.  ...  Fig.4 Linux Kernel Binary shows the difference in kernel layout between Bootless Boot kernel and legacy kernel.  ... 
doi:10.1109/hpcc.and.euc.2013.290 dblp:conf/hpcc/LeeW13 fatcat:s3cl7rto7zfpnevluw2majh7ta

Manipulating semantic values in kernel data structures: Attack assessments and implications

Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin
2013 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
Semantic values in kernel data structures are critical to many security applications, such as virtual machine introspection, malware analysis, and memory forensics.  ...  Our proof-of-concept kernel rootkit further demonstrates that it can successfully evade all the security tools tested in our experiments, including recently proposed robust signature schemes.  ...  This research was supported in part by NSF grant #1018217, NSF grant #1054605, McAfee Inc, and VMware Inc.  ... 
doi:10.1109/dsn.2013.6575344 dblp:conf/dsn/PrakashVYL13 fatcat:jivirx6phveqdanowp7oerf3ze

Robust Linux memory acquisition with minimal target impact

Johannes Stüttgen, Michael Cohen
2014 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
On Linux, kernel modules must be compiled against the exact version of kernel headers and the exact kernel configuration used to build the currently executing kernel.  ...  This makes Linux memory acquisition significantly more complex in practice, than on other platforms due to the number of variations of kernel versions and configurations, especially when responding to  ...  Acknowledgments We would like to thank Darren Bilby and Heather Adkins for reading a previous version of this paper and giving us valuable feedback and suggestions for improvement.  ... 
doi:10.1016/j.diin.2014.03.014 fatcat:fvsnpeky4vgqrhpb5vpcrfbfuu

Benchmarking weak memory models

Carl G. Ritson, Scott Owens
2016 Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming - PPoPP '16  
We demonstrate our technique on both synthetic benchmarks and real-world applications for the Linux Kernel and OpenJDK Hotspot Virtual Machine on the ARMv8 and POW-ERv7 architectures.  ...  In this paper, we focus on the performance side, and define techniques for evaluating the impact of various choices in using weak memory models, such as where to put fences, and which fences to use.  ...  Acknowledgments This work was funded by EPSRC grants EP/K040561/1 and EP/M017176/1.  ... 
doi:10.1145/2851141.2851150 dblp:conf/ppopp/RitsonO16 fatcat:sbysez2eyncp7mie25g4vvmx74

Treasure and tragedy in kmem_cache mining for live forensics investigation

Andrew Case, Lodovico Marziale, Cris Neckar, Golden G. Richard
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The kmem_cache is used by the Linux kernel to quickly allocate and deallocate kernel structures associated with processes, files, and the network stack.  ...  This paper presents the first deep investigation of the kmem_cache facility in Linux from a forensics perspective.  ...  In order to facilitate fast lookups of open and in-use ports, the Linux kernel tracks each in-use port within a quickly searchable data structure.  ... 
doi:10.1016/j.diin.2010.05.006 fatcat:oknwlpgzxrb67pufobvbwqdqdy

Research on Reliability Design of Data Storage for Embedded System

Liu Chao, Hu Fang
2012 Physics Procedia  
Many methods to ensure the reliability of data storage in all aspects of the system design process based on the characteristics of embedded systems will be proposed In this paper and have certain significance  ...  on the reliability design of data storage in embedded system design.  ...  In recent years the traditional EEPROM and Flash RAM (memory) is non-volatile storage device, characterized by storing the data will not be lost down and the external interference.  ... 
doi:10.1016/j.phpro.2012.03.253 fatcat:rhj3opcclngz7aau224vjbjvpq

XOS: An Application-Defined Operating System for Data Center Servers [article]

Chen Zheng, Lei Wang, Sally A. McKee, Lixin Zhang, Hainan Ye, Jianfeng Zhan
2019 arXiv   pre-print
Our design moves resource management out of the OS kernel, supports customizable kernel subsystems in user space, and enables elastic partitioning of hardware resources.  ...  XOS speeds up a set of DC workloads by up to 1.6X over our baseline Linux on a 24-core server, and outperforms the state-of-the-art Dune by up to 3.3X in terms of virtual memory management.  ...  XOS is implemented in Ubuntu with Linux kernel version 3.13.2. We choose Linux with the same kernel as the baseline and Dune (IX) as another comparison point of XOS.  ... 
arXiv:1901.00825v1 fatcat:6bvouuqiofc37p7fxzczobmulq

A Durable Hybrid RAM Disk with a Rapid Resilience for Sustainable IoT Devices

Sung Hoon Baek, Ki-Woong Park
2020 Sensors  
The presented schemes and device were implemented in the Linux kernel. Experimental evaluations were performed using various benchmarks at the block level till the file level.  ...  Despite such advantages of RAM, a RAM-based storage system has limitations in its use for sustainable IoT devices due to its nature of volatile storage.  ...  Conflicts of The authors declare no conflict of interest.  ... 
doi:10.3390/s20082159 pmid:32290359 fatcat:a3egdleimbcjhlb56kh53vdcpq

Non-volatile main memory management methods based on a file system

Shuichi Oikawa
2014 SpringerPlus  
We implemented the proposed methods in the Linux kernel, and performed the evaluation on the QEMU system emulator.  ...  There are upcoming non-volatile (NV) memory technologies that provide byte addressability and high performance. PCM, MRAM, and STT-RAM are such examples.  ...  Figure 9 shows the results of building the Linux kernel by employing the proposed methods. The cost of building the Linux kernel is divided in the two phases, compiling and linking.  ... 
doi:10.1186/2193-1801-3-494 pmid:25279289 pmcid:PMC4162891 fatcat:s5xvb5livjd5xj2yvl3vntxese

Practical channel state aware and cooperative packet scheduling disciplines for coordinating colocated Bluetooth and IEEE 802.11b devices

Hoi Kit Yip, Yu-Kwong Kwok
2007 Computer Communications  
Finally, guided by our practical findings, we proposed and implemented two new packet scheduling algorithms in Linux to provide the best trade-offs to colocated Bluetooth and IEEE 802.11b traffics, as  ...  In this study we performed a detailed implementation of a Linux based network access point (NAP), in which Bluetooth and IEEE 802.11b interfaces are colocated.  ...  Jean Tourrilhes, who is the author of the Wireless Extensions [38] , for his insightful advice in Linux kernel Programming.  ... 
doi:10.1016/j.comcom.2007.01.010 fatcat:m6fn26c64jg7da4ghsytgknhre

FENCE: Fast, ExteNsible, and ConsolidatEd Framework for Intelligent Big Data Processing

Ramneek, Seung-Jun Cha, Sangheon Pack, Seung Hyub Jeon, Yeon Jeong Jeong, Jin Mee Kim, Sungin Jung
2020 IEEE Access  
do not leverage the features of existing OS kernels that have already verified their robustness and stability in the production environment.  ...  in monolithic OS kernels such as Linux.  ... 
doi:10.1109/access.2020.3007747 fatcat:2udiua57pfgklivxt26rn6jhlm


Ellick Chan, Shivaram Venkataraman, Francis David, Amey Chaugule, Roy Campbell
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
We show that Forenscope can detect stealth rootkits, neutralize threats and expedite the investigation process by finding evidence in memory.  ...  Forenscope preserves the state of the running system and allows running processes, open files, encrypted filesystems and open network sockets to persist during the analysis process.  ...  The hooks and techniques used by BitBlocker are common to Linux 2.6.x kernels and they are robust to changes in the kernel version. Similar techniques are possible for other operating systems.  ... 
doi:10.1145/1920261.1920307 dblp:conf/acsac/ChanVDCC10 fatcat:amcisy34n5cl7o2uat4mnpdemq

Acquisition and analysis of compromised firmware using memory forensics

Johannes Stüttgen, Stefan Vömel, Michael Denzel
2015 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
To a great degree, research in memory forensics concentrates on the acquisition and analysis of kernel-and user-space software from physical memory to date.  ...  In this paper, we illustrate a variety of firmware manipulation techniques and propose methods for identifying firmware-level threats in the course of memory forensic investigations.  ...  Bradley Schatz for his guidance in revising the paper.  ... 
doi:10.1016/j.diin.2015.01.010 fatcat:tqtklslivfehdgdytzj35os7rm

SeCloak: ARM Trustzone-based Mobile Peripheral Control [article]

Matthew Lentz, Rijurekha Sen, Peter Druschel, Bobby Bhattacharjee
2020 arXiv   pre-print
We design a secure kernel that co-exists with software running on mobile devices (e.g., Android and Linux) without requiring any code modifications.  ...  In this paper, we present SeCloak, an ARM TrustZone-based solution that ensures reliable on-off control of peripherals even when the platform software is compromised.  ...  The work was supported in part by the European Research Council (ERC Synergy imPACT 610150), the German Science Foundation (DFG CRC 1223), and the National Science Foundation (NSF CNS 1526635 and NSF CNS  ... 
arXiv:2001.08840v1 fatcat:d2dhuiom5rfjxhnsbzsaijr6qm
« Previous Showing results 1 — 15 out of 1,122 results