A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Booting Linux faster
2012
2012 3rd IEEE International Conference on Network Infrastructure and Digital Content
Their non-volatile characteristic makes several processes in existing boot mechanism unnecessary. If these processes are eliminated, the system users can spend shorter time to control the system. ...
In this paper, we propose a technique which uses only one kernel image for every booting by using nonvolatile memories. ...
Boot process of Linux Booting is a process that makes CPUs, memories and other devices to initialize and operating system to run, so that the user can use the stabilized system. ...
doi:10.1109/icnidc.2012.6418839
dblp:conf/icnidc/LeeW12
fatcat:guiuvl4cpratrm42x3vzjgmtaq
Bootless Boot: Reducing Device Boot Latency with Byte Addressable NVRAM
2013
2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
This technique eliminates the kernel loading, the kernel decompression, and the reallocation of a kernel image by maintaining of the linux binary image at the non-volatile random access memory. ...
Explicit initialization module is added to the linux kernel. ...
Fig.4 Linux Kernel Binary shows the difference in kernel layout between Bootless Boot kernel and legacy kernel. ...
doi:10.1109/hpcc.and.euc.2013.290
dblp:conf/hpcc/LeeW13
fatcat:s3cl7rto7zfpnevluw2majh7ta
Manipulating semantic values in kernel data structures: Attack assessments and implications
2013
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Semantic values in kernel data structures are critical to many security applications, such as virtual machine introspection, malware analysis, and memory forensics. ...
Our proof-of-concept kernel rootkit further demonstrates that it can successfully evade all the security tools tested in our experiments, including recently proposed robust signature schemes. ...
This research was supported in part by NSF grant #1018217, NSF grant #1054605, McAfee Inc, and VMware Inc. ...
doi:10.1109/dsn.2013.6575344
dblp:conf/dsn/PrakashVYL13
fatcat:jivirx6phveqdanowp7oerf3ze
Robust Linux memory acquisition with minimal target impact
2014
Digital Investigation. The International Journal of Digital Forensics and Incident Response
On Linux, kernel modules must be compiled against the exact version of kernel headers and the exact kernel configuration used to build the currently executing kernel. ...
This makes Linux memory acquisition significantly more complex in practice, than on other platforms due to the number of variations of kernel versions and configurations, especially when responding to ...
Acknowledgments We would like to thank Darren Bilby and Heather Adkins for reading a previous version of this paper and giving us valuable feedback and suggestions for improvement. ...
doi:10.1016/j.diin.2014.03.014
fatcat:fvsnpeky4vgqrhpb5vpcrfbfuu
Benchmarking weak memory models
2016
Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming - PPoPP '16
We demonstrate our technique on both synthetic benchmarks and real-world applications for the Linux Kernel and OpenJDK Hotspot Virtual Machine on the ARMv8 and POW-ERv7 architectures. ...
In this paper, we focus on the performance side, and define techniques for evaluating the impact of various choices in using weak memory models, such as where to put fences, and which fences to use. ...
Acknowledgments This work was funded by EPSRC grants EP/K040561/1 and EP/M017176/1. ...
doi:10.1145/2851141.2851150
dblp:conf/ppopp/RitsonO16
fatcat:sbysez2eyncp7mie25g4vvmx74
Treasure and tragedy in kmem_cache mining for live forensics investigation
2010
Digital Investigation. The International Journal of Digital Forensics and Incident Response
The kmem_cache is used by the Linux kernel to quickly allocate and deallocate kernel structures associated with processes, files, and the network stack. ...
This paper presents the first deep investigation of the kmem_cache facility in Linux from a forensics perspective. ...
In order to facilitate fast lookups of open and in-use ports, the Linux kernel tracks each in-use port within a quickly searchable data structure. ...
doi:10.1016/j.diin.2010.05.006
fatcat:oknwlpgzxrb67pufobvbwqdqdy
Research on Reliability Design of Data Storage for Embedded System
2012
Physics Procedia
Many methods to ensure the reliability of data storage in all aspects of the system design process based on the characteristics of embedded systems will be proposed In this paper and have certain significance ...
on the reliability design of data storage in embedded system design. ...
In recent years the traditional EEPROM and Flash RAM (memory) is non-volatile storage device, characterized by storing the data will not be lost down and the external interference. ...
doi:10.1016/j.phpro.2012.03.253
fatcat:rhj3opcclngz7aau224vjbjvpq
XOS: An Application-Defined Operating System for Data Center Servers
[article]
2019
arXiv
pre-print
Our design moves resource management out of the OS kernel, supports customizable kernel subsystems in user space, and enables elastic partitioning of hardware resources. ...
XOS speeds up a set of DC workloads by up to 1.6X over our baseline Linux on a 24-core server, and outperforms the state-of-the-art Dune by up to 3.3X in terms of virtual memory management. ...
XOS is implemented in Ubuntu with Linux kernel version 3.13.2. We choose Linux with the same kernel as the baseline and Dune (IX) as another comparison point of XOS. ...
arXiv:1901.00825v1
fatcat:6bvouuqiofc37p7fxzczobmulq
A Durable Hybrid RAM Disk with a Rapid Resilience for Sustainable IoT Devices
2020
Sensors
The presented schemes and device were implemented in the Linux kernel. Experimental evaluations were performed using various benchmarks at the block level till the file level. ...
Despite such advantages of RAM, a RAM-based storage system has limitations in its use for sustainable IoT devices due to its nature of volatile storage. ...
Conflicts of The authors declare no conflict of interest. ...
doi:10.3390/s20082159
pmid:32290359
fatcat:a3egdleimbcjhlb56kh53vdcpq
Non-volatile main memory management methods based on a file system
2014
SpringerPlus
We implemented the proposed methods in the Linux kernel, and performed the evaluation on the QEMU system emulator. ...
There are upcoming non-volatile (NV) memory technologies that provide byte addressability and high performance. PCM, MRAM, and STT-RAM are such examples. ...
Figure 9 shows the results of building the Linux kernel by employing the proposed methods. The cost of building the Linux kernel is divided in the two phases, compiling and linking. ...
doi:10.1186/2193-1801-3-494
pmid:25279289
pmcid:PMC4162891
fatcat:s5xvb5livjd5xj2yvl3vntxese
Practical channel state aware and cooperative packet scheduling disciplines for coordinating colocated Bluetooth and IEEE 802.11b devices
2007
Computer Communications
Finally, guided by our practical findings, we proposed and implemented two new packet scheduling algorithms in Linux to provide the best trade-offs to colocated Bluetooth and IEEE 802.11b traffics, as ...
In this study we performed a detailed implementation of a Linux based network access point (NAP), in which Bluetooth and IEEE 802.11b interfaces are colocated. ...
Jean Tourrilhes, who is the author of the Wireless Extensions [38] , for his insightful advice in Linux kernel Programming. ...
doi:10.1016/j.comcom.2007.01.010
fatcat:m6fn26c64jg7da4ghsytgknhre
FENCE: Fast, ExteNsible, and ConsolidatEd Framework for Intelligent Big Data Processing
2020
IEEE Access
do not leverage the features of existing OS kernels that have already verified their robustness and stability in the production environment. ...
in monolithic OS kernels such as Linux. ...
doi:10.1109/access.2020.3007747
fatcat:2udiua57pfgklivxt26rn6jhlm
Forenscope
2010
Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10
We show that Forenscope can detect stealth rootkits, neutralize threats and expedite the investigation process by finding evidence in memory. ...
Forenscope preserves the state of the running system and allows running processes, open files, encrypted filesystems and open network sockets to persist during the analysis process. ...
The hooks and techniques used by BitBlocker are common to Linux 2.6.x kernels and they are robust to changes in the kernel version. Similar techniques are possible for other operating systems. ...
doi:10.1145/1920261.1920307
dblp:conf/acsac/ChanVDCC10
fatcat:amcisy34n5cl7o2uat4mnpdemq
Acquisition and analysis of compromised firmware using memory forensics
2015
Digital Investigation. The International Journal of Digital Forensics and Incident Response
To a great degree, research in memory forensics concentrates on the acquisition and analysis of kernel-and user-space software from physical memory to date. ...
In this paper, we illustrate a variety of firmware manipulation techniques and propose methods for identifying firmware-level threats in the course of memory forensic investigations. ...
Bradley Schatz for his guidance in revising the paper. ...
doi:10.1016/j.diin.2015.01.010
fatcat:tqtklslivfehdgdytzj35os7rm
SeCloak: ARM Trustzone-based Mobile Peripheral Control
[article]
2020
arXiv
pre-print
We design a secure kernel that co-exists with software running on mobile devices (e.g., Android and Linux) without requiring any code modifications. ...
In this paper, we present SeCloak, an ARM TrustZone-based solution that ensures reliable on-off control of peripherals even when the platform software is compromised. ...
The work was supported in part by the European Research Council (ERC Synergy imPACT 610150), the German Science Foundation (DFG CRC 1223), and the National Science Foundation (NSF CNS 1526635 and NSF CNS ...
arXiv:2001.08840v1
fatcat:d2dhuiom5rfjxhnsbzsaijr6qm
« Previous
Showing results 1 — 15 out of 1,122 results