2,822 Hits in 8.9 sec

EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity Measurement [article]

Brian Delgado, Karen L. Karavanic
2018 arXiv   pre-print
Early results are promising, and suggest that EPA-RIMM will meet production-level performance constraints while continuously monitoring key OS and hypervisor data structures for signs of attack.  ...  Runtime integrity measurements identify unexpected changes in operating systems and hypervisors during operation, enabling early detection of persistent threats.  ...  For RIMM purposes, SMM provides critical benefits: • SMM runs at a higher privilege than host software; • SMM has broad visibility into operating system and hypervisor (host software) memory 2 and CPU  ... 
arXiv:1805.03755v1 fatcat:koovoefsdjg3bh2f4igjelwenq

Integrating Linux and the real-time ERIKA OS through the Xen hypervisor

Arianna Avanzini, Paolo Valente, Dario Faggioli, Paolo Gai
2015 10th IEEE International Symposium on Industrial Embedded Systems (SIES)  
reliability of the automotive-grade ERIKA Enterprise operating system, a small-footprint real-time OS suitable for safety-critical control tasks and able to execute commands triggered by Linux.  ...  The operating systems run on dedicated cores and, for efficiency reasons, they share memory with limited support for memory protection: although the system allows running two operating systems, from a  ...  Communication has been implemented with two interacting and interdependent software components, the first residing in the general-purpose dom0 and the second hosted by the realtime domU.  ... 
doi:10.1109/sies.2015.7185063 dblp:conf/sies/AvanziniVFG15 fatcat:lfpjmqfuuvfljakzwbglvygd7i

Distributed Ledger Technology based Integrated Healthcare Solution for Bangladesh [article]

Md. Ariful Islam, Md. Antonin Islam, Md. Amzad Hossain Jacky, Md. Al-Amin, M. Saef Ullah Miah, Md Muhidul Islam Khan, Md. Iqbal Hossain
2022 arXiv   pre-print
For data integrity, privacy, permission and service availability, the proposed solution leverages Hyperledger fabric and Blockchain as a Service.  ...  The proposed application consists of various application interfaces for various system users.  ...  Then, select the NAT forwarding option. Next, select Virtual Server and specify the external port and the internal port with the private IP of the guest machine.  ... 
arXiv:2205.15416v1 fatcat:pzymhjkygnb4ranhxjb3co7kfe

Checkpointing for Virtual Platforms and SystemC-TLM

Màrius Monton, Jakob Engblom, Mark Burton
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
for the state of the system or selected devices.  ...  The emulated systems can run unmodified Operating Systems (guest O.S.) like GNU/Linux or MS-Windows XP on different host O.S.  ... 
doi:10.1109/tvlsi.2011.2181881 fatcat:xhlbdcuu2ng7rpj5msizqzitaa

Integrated Security Incident Management -- Concepts and Real-World Experiences

Stefan Metzger, Wolfgang Hommel, Helmut Reiser
2011 2011 Sixth International Conference on IT Security Incident Management and IT Forensics  
Depending on an incident's classification, manual intervention or even fully automated reaction steps can be triggered; this starts with simple email notifications of system and network administrators,  ...  and scales up to quarantining compromised systems and subnetworks automatically.  ...  Within the integrated asset management, individual hosts, subnets, or networks can be consolidated to host or network groups, which improves clarity.  ... 
doi:10.1109/imf.2011.15 dblp:conf/imf/MetzgerHR11 fatcat:lb773umryvbfhownchdbf7pmfa

Increasing quality and managing complexity in neuroinformatics software development with continuous integration

Yury V. Zaytsev, Abigail Morrison
2013 Frontiers in Neuroinformatics  
To address this issue, here we develop a scalable, low-cost and open source solution for continuous integration (CI), a technique which ensures the quality of changes to the code base during the development  ...  project and additional benefits for three further projects.  ...  This also implies that all necessary software packages and libraries should be installed system-wide via the integrated package management facilities.  ... 
doi:10.3389/fninf.2012.00031 pmid:23316158 pmcid:PMC3539731 fatcat:hisspkrt5vautmi4cab2ekfhge

VMSimInt: A Network Simulation Tool Supporting Integration of Arbitrary Kernels and Applications

Thomas Werthmann, Matthias Kaschub, Mirja Kühlewind, Sebastian Scholz, David Wagner
2014 Proceedings of the Seventh International Conference on Simulation Tools and Techniques  
Integrating realistic behavior of end systems into simulations is challenging since the mechanisms used in protocols and applications such as Transmission Control Protocol (TCP) are complex and continuously  ...  In this paper, we present VMSimInt, a new approach which allows the INTegration of arbitrary Operating Systems (OSs) and application code into an event-driven network SIMulator by using Virtual Machines  ...  VMSimInt uses the QEMU software [2] for hosting VMs.  ... 
doi:10.4108/icst.simutools.2014.254623 dblp:conf/simutools/WerthmannKKSW14 fatcat:hc37grginbhrnk4ts5v2yec4za

Seamless integration of interactive forms into the Web

Andreas Girgensohn, Alison Lee
1997 Computer networks and ISDN systems  
Simple forms provide input for search engines, more complex ones are used for on-line ordering and surveys, and one can envision a form for a Web-based tax return.  ...  We describe how the abstraction is seamlessly integrated into the Web framework by leveraging on the virtues of the Web and fitting within the interaction and usage model of the Web. © 1997 Published by  ...  One issue is integration with the rest of the HTML document (e.g., for selecting fonts or for loading new documents).  ... 
doi:10.1016/s0169-7552(97)00063-9 fatcat:kfzyfaqmvjce7j5tc6mkjv4wdm

VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices [chapter]

Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng
2017 Lecture Notes in Computer Science  
As cloud computing becomes more and more prevalent, there is increased interest in mitigating attacks that target hypervisors from within the virtualized guest environments that they host.  ...  We present VDF, a targeted evolutionary fuzzing framework for discovering bugs within the software-based virtual devices implemented as part of a hypervisor.  ...  Aftersight [27] records selected system events and then offloads those events to another system for replay and analysis.  ... 
doi:10.1007/978-3-319-66332-6_1 fatcat:5owbtlyx7fasnkkjbxqbia3rje

Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture [article]

Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger
2014 arXiv   pre-print
systems due to the lack of virtualization support and/or the expense of virtualization.  ...  Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are now a threat to smartphones.  ...  Rootkits are a common problem for conventional operating systems, which are large, complex software systems that may contain many latent vulnerabilities and which run many processes with full privilege  ... 
arXiv:1410.7747v1 fatcat:onuokqtnjnc67bwmyks4rhtjua

A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization

Zonghua Gu, Qingling Zhao
2012 Journal of Software Engineering and Applications  
We present a comprehensive survey on real-time issues in virtualization for embedded systems, covering popular virtualization systems including KVM, Xen, L4 and others.  ...  A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization 278 that are not specific to any virtualization approach, but we believe they are of sufficient importance to dedicate separate  ...  [50] addressed I/O and networking issues by grouping both guest VM threads and interrupt handler threads in the KVM host OS kernel into the same CBS reservation, and over-provisioning the CPU budget  ... 
doi:10.4236/jsea.2012.54033 fatcat:iiqszwe3brhjxl4ycyf6ynbp2u

Enabling Parallelized-QEMU for Hardware/Software Co-Simulation Virtual Platforms

Edel Díaz, Raúl Mateos, Emilio J. Bueno, Rubén Nieto
2021 Electronics  
This growth is appreciated in Multi-Processor System-On-Chips (MPSoC), composed of more cores in heterogeneous and homogeneous architectures in recent years.  ...  In addition, performance analysis of the software emulator with the new synchronization mechanism is presented, using: (1) a boot Linux for MPSoC Zynq−7000 (dual-core ARM Cortex-A9) (Xilinx, San Jose,  ...  Acknowledgments: The authors would like to thank Slavka Madarova for her huge support in English review. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10060759 fatcat:dnxlzta6pvft7inpxjotplf2g4

Fine-grained preemption analysis for latency investigation across virtual machines

Mohamad Gebai, Francis Giraldeau, Michel R Dagenais
2014 Journal of Cloud Computing: Advances, Systems and Applications  
We then devised an algorithm to recover the root cause of preemption between threads at every level.  ...  We developed an efficient and portable trace synchronization method, which is required to account for time offset and drift that occur within each virtual machine.  ...  We also thank Geneviève Bastien for her help in the Open Source project Trace Compass and Naser Ezzati Jivan for reviewing this paper.  ... 
doi:10.1186/s13677-014-0023-3 fatcat:o7md5yzou5fcrpi2cuz4fsox4y

Extending STI for demanding hard-real-time systems

Benjamin Welch, Shobhit Kanaujia, Adarsh Seetharam, Deepaksrivats Thirumalai, Alexander G. Dean
2003 Proceedings of the international conference on Compilers, architectures and synthesis for embedded systems - CASES '03  
Software thread integration (STI) is a compilation technique which enables the efficient use of an application's fine-grain idle time on generic processors without special hardware support.  ...  hence both improves performance and also offers very fine-grain concurrency.  ...  In addition, thanks go to Atmel and BITS for the kind donations of development tools.  ... 
doi:10.1145/951710.951719 dblp:conf/cases/WelchKSTD03 fatcat:kpmkl2eg25hptfuvmt6w7ipncm

Boosting GPU Virtualization Performance with Hybrid Shadow Page Tables

Yaozu Dong, Mochi Xue, Xiao Zheng, Jiajun Wang, Zhengwei Qi, Haibing Guan
2015 USENIX Annual Technical Conference  
By significantly reducing trap-and-emulation due to page table updates, gHyvi significantly improves gVirt's performance for memory-intensive GPU workloads.  ...  Evaluation using GMedia shows that gHyvi can achieve up to 13x performance improvement compared to gVirt, and up to 85% native performance for multithread media transcoding.  ...  Acknowledgements We thank our shepherd Dan Tsafrir, Haibo Chen, and the anonymous reviewers for their insightful comments.  ... 
dblp:conf/usenix/DongXZWQG15 fatcat:oymtk3p57vcztnun6hybst4wiy
« Previous Showing results 1 — 15 out of 2,822 results