首页 > 最新文献

2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
Two Efficient Software Techniques to Detect and Correct Control-Flow Errors 两种检测和纠正控制流错误的有效软件技术
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.10
H. Zarandi, M. Maghsoudloo, N. Khoshavi
This paper proposes two efficient software techniques, Control-flow and Data Errors Correction using Data-flow Graph Consideration (CDCC) and Miniaturized Check-Pointing (MCP), to detect and correct control-flow errors. These techniques have been implemented based on addition of redundant codes in a given program. The creativity applied in the methods for online detection and correction of the control-flow errors is using data-flow graph alongside of using control-flow graph. These techniques can detect most of the control-flow errors in the program firstly, and next can correct them, automatically. Therefore, both errors in the control-flow and program data which is caused by control-flow errors can be corrected, efficiently. In order to evaluate the proposed techniques, a post compiler is used, so that the techniques can be applied to every 80X86 binaries, transparently. Three benchmarks quick sort, matrix multiplication and linked list are used, and a total of 5000 transient faults are injected on several executable points in each program. The experimental results demonstrate that at least 93% and 89% of the control-flow errors can be detected and corrected without any data error generation by the CDCC and MCP, respectively. Moreover, the strength of these techniques is significant reduction in the performance and memory overheads in compare to traditional methods, for as much as remarkable correction abilities.
本文提出了两种有效的软件技术,即利用数据流图考虑(CDCC)和小型化检查点(MCP)来检测和纠正控制流错误的控制流和数据纠错技术。这些技术是基于在给定程序中添加冗余代码来实现的。控制流误差在线检测与校正方法的创新之处在于除控制流图外,还采用了数据流图。这些技术可以首先检测出程序中的大部分控制流错误,然后自动纠正这些错误。因此,可以有效地纠正由控制流错误引起的控制流和程序数据中的错误。为了评估所建议的技术,使用了post编译器,以便这些技术可以透明地应用于每个80X86二进制文件。采用快速排序、矩阵乘法和链表三个基准,在每个程序的几个可执行点上注入了5000个瞬态故障。实验结果表明,CDCC和MCP分别可以在不产生任何数据误差的情况下检测和校正至少93%和89%的控制流误差。此外,与传统方法相比,这些技术的优势在于显著降低了性能和内存开销,并且具有出色的校正能力。
{"title":"Two Efficient Software Techniques to Detect and Correct Control-Flow Errors","authors":"H. Zarandi, M. Maghsoudloo, N. Khoshavi","doi":"10.1109/PRDC.2010.10","DOIUrl":"https://doi.org/10.1109/PRDC.2010.10","url":null,"abstract":"This paper proposes two efficient software techniques, Control-flow and Data Errors Correction using Data-flow Graph Consideration (CDCC) and Miniaturized Check-Pointing (MCP), to detect and correct control-flow errors. These techniques have been implemented based on addition of redundant codes in a given program. The creativity applied in the methods for online detection and correction of the control-flow errors is using data-flow graph alongside of using control-flow graph. These techniques can detect most of the control-flow errors in the program firstly, and next can correct them, automatically. Therefore, both errors in the control-flow and program data which is caused by control-flow errors can be corrected, efficiently. In order to evaluate the proposed techniques, a post compiler is used, so that the techniques can be applied to every 80X86 binaries, transparently. Three benchmarks quick sort, matrix multiplication and linked list are used, and a total of 5000 transient faults are injected on several executable points in each program. The experimental results demonstrate that at least 93% and 89% of the control-flow errors can be detected and corrected without any data error generation by the CDCC and MCP, respectively. Moreover, the strength of these techniques is significant reduction in the performance and memory overheads in compare to traditional methods, for as much as remarkable correction abilities.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Asynchronous Checkpoint-Based Redundant Multithreading Architecture 基于异步检查点的冗余多线程体系结构
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.27
Jie Yin, Jianhui Jiang
Existing redundant multithreading (RMT) detects faults by comparing the result of each instruction between the master and slave threads, which can lead to huge comparison and communication overhead. To address this problem, the checkpoint-based RMT (like RVQ_F) was proposed, but in such architectures, master threads must wait for slave threads to arrive at the same position at each checkpoint, this may delay the release of resources occupied by master threads and decrease performance. This paper proposes an asynchronous checkpoint-based redundant multithreading architecture (AC-RMT), in which two context saving rooms are set aside for each thread, one for detecting faults, and the other for saving the last checkpoint used for fault restoration. Compared with RVQ_F, AC-RMT efficiently boosts performance because, by avoiding the waiting of master threads at checkpoints, resources can be released timely.
现有的冗余多线程(RMT)通过比较主线程和从线程之间每条指令的结果来检测故障,这可能导致巨大的比较和通信开销。为了解决这个问题,提出了基于检查点的RMT(如RVQ_F),但在这种体系结构中,主线程必须等待从线程到达每个检查点的相同位置,这可能会延迟释放主线程占用的资源并降低性能。本文提出了一种基于异步检查点的冗余多线程架构(AC-RMT),该架构为每个线程留出两个上下文保存室,一个用于检测故障,另一个用于保存用于故障恢复的最后一个检查点。与RVQ_F相比,AC-RMT有效地提高性能,因为,通过避免主线程的等待在检查站,资源可以及时发布。
{"title":"An Asynchronous Checkpoint-Based Redundant Multithreading Architecture","authors":"Jie Yin, Jianhui Jiang","doi":"10.1109/PRDC.2010.27","DOIUrl":"https://doi.org/10.1109/PRDC.2010.27","url":null,"abstract":"Existing redundant multithreading (RMT) detects faults by comparing the result of each instruction between the master and slave threads, which can lead to huge comparison and communication overhead. To address this problem, the checkpoint-based RMT (like RVQ_F) was proposed, but in such architectures, master threads must wait for slave threads to arrive at the same position at each checkpoint, this may delay the release of resources occupied by master threads and decrease performance. This paper proposes an asynchronous checkpoint-based redundant multithreading architecture (AC-RMT), in which two context saving rooms are set aside for each thread, one for detecting faults, and the other for saving the last checkpoint used for fault restoration. Compared with RVQ_F, AC-RMT efficiently boosts performance because, by avoiding the waiting of master threads at checkpoints, resources can be released timely.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal Validation and Requirements Management Based on the Jackson's Reference Model for Requirements and Specifications 基于Jackson需求和规格说明参考模型的正式验证和需求管理
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.42
Takashi Kitamura, Keishi Okamoto, M. Takeyama
This research aims to develop a formal framework for (1) formal validation for satisfiability of specifications to requirements, and (2) requirements management based on the Jackson's reference model for requirements and specifications, which provides an insight and perspective basis for relationship between requirements and specifications. To develop the framework, we use propositional logic, from which we derive formal discussion and devices for computer assistance. In the framework the validation for satisfiability of specifications to requirements is ascribed to the validity checking of logical formulas. Also within the framework we develop a useful notion of ``weakest adequate specifications'' with its calculating technique. We will demonstrate the usefulness of the framework with practical examples.
本研究旨在开发一个形式化框架,用于(1)规范对需求的可满足性的形式化验证,以及(2)基于Jackson的需求和规范参考模型的需求管理,为需求和规范之间的关系提供一个洞察和视角基础。为了开发框架,我们使用命题逻辑,从中我们推导出正式的讨论和计算机辅助设备。在该框架中,规范对需求的可满足性的验证被归结为逻辑公式的有效性检查。此外,在框架内,我们开发了一个有用的概念,即“最弱的适当规范”及其计算技术。我们将通过实际示例演示该框架的有用性。
{"title":"Formal Validation and Requirements Management Based on the Jackson's Reference Model for Requirements and Specifications","authors":"Takashi Kitamura, Keishi Okamoto, M. Takeyama","doi":"10.1109/PRDC.2010.42","DOIUrl":"https://doi.org/10.1109/PRDC.2010.42","url":null,"abstract":"This research aims to develop a formal framework for (1) formal validation for satisfiability of specifications to requirements, and (2) requirements management based on the Jackson's reference model for requirements and specifications, which provides an insight and perspective basis for relationship between requirements and specifications. To develop the framework, we use propositional logic, from which we derive formal discussion and devices for computer assistance. In the framework the validation for satisfiability of specifications to requirements is ascribed to the validity checking of logical formulas. Also within the framework we develop a useful notion of ``weakest adequate specifications'' with its calculating technique. We will demonstrate the usefulness of the framework with practical examples.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors 基于最小回滚的流水线处理器容错恢复方案
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.44
Jun Yao, Ryoji Watanabe, Takashi Nakada, Hajime Shimada, Y. Nakashima, Kazutoshi Kobayashi
In this paper, we proposed a light-weighted recovery scheme for fault tolerable pipeline processors after error has been detected by redundant executions. A minimal rolling back procedure is designed to schedule the re-execution based recovery in a one-cycle delay. This scheme makes full use of in-fly pipeline working status to aid the recovery, which relieves the recovery from a large checkpoint buffer.
在本文中,我们提出了一种轻量级的可容错流水线处理器在冗余执行检测到错误后的恢复方案。最小回滚过程设计用于在一个周期延迟内调度基于恢复的重新执行。该方案充分利用了在线管道的工作状态来辅助恢复,从而减少了大量检查点缓冲区的恢复。
{"title":"A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors","authors":"Jun Yao, Ryoji Watanabe, Takashi Nakada, Hajime Shimada, Y. Nakashima, Kazutoshi Kobayashi","doi":"10.1109/PRDC.2010.44","DOIUrl":"https://doi.org/10.1109/PRDC.2010.44","url":null,"abstract":"In this paper, we proposed a light-weighted recovery scheme for fault tolerable pipeline processors after error has been detected by redundant executions. A minimal rolling back procedure is designed to schedule the re-execution based recovery in a one-cycle delay. This scheme makes full use of in-fly pipeline working status to aid the recovery, which relieves the recovery from a large checkpoint buffer.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122009459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms 为灵活高效的安全机制实现混合虚拟机监控
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.32
Junya Sawazaki, T. Maeda, A. Yonezawa
Virtual machine monitors (VMMs) have emerged as potential tools %% are one of the promising approaches for implementing security mechanisms to enhance the security and/or reliability of software systems. There are two approaches to implementing VMMs. One is a software-based approach that emulates the execution of virtual machines via software. The other is a hardware-based approach that utilizes the hardware virtualization support of CPUs. The software-based approach is preferred for implementing security mechanisms, whereas the hardware-based approach is preferred from the viewpoint of performance. In this paper, we present an approach to implementing a hybrid VMM for flexible and efficient security mechanisms. The hybrid VMM consists of a software-based VMM (QEMU) and hardware-based VMM (KVM), and it dynamically switches between them. Using the hybrid VMM, security- and reliability-critical software can be executed on the software-based VMM, and performance-critical software can be executed on the hardware-based VMM. We also present the results of experiments conducted to evaluate the performance and verify the effectiveness of the hybrid VMM.
虚拟机监视器(vmm)已经成为潜在的工具%%是实现安全机制以增强软件系统的安全性和/或可靠性的有前途的方法之一。有两种实现vmm的方法。一种是基于软件的方法,通过软件模拟虚拟机的执行。另一种是基于硬件的方法,它利用cpu的硬件虚拟化支持。基于软件的方法是实现安全机制的首选方法,而从性能的角度来看,基于硬件的方法是首选方法。在本文中,我们提出了一种实现灵活高效安全机制的混合VMM的方法。混合VMM由基于软件的VMM (QEMU)和基于硬件的VMM (KVM)组成,并在两者之间动态切换。使用混合VMM,安全性和可靠性关键型软件可以在基于软件的VMM上执行,性能关键型软件可以在基于硬件的VMM上执行。我们还介绍了评估混合VMM性能和验证其有效性的实验结果。
{"title":"Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms","authors":"Junya Sawazaki, T. Maeda, A. Yonezawa","doi":"10.1109/PRDC.2010.32","DOIUrl":"https://doi.org/10.1109/PRDC.2010.32","url":null,"abstract":"Virtual machine monitors (VMMs) have emerged as potential tools %% are one of the promising approaches for implementing security mechanisms to enhance the security and/or reliability of software systems. There are two approaches to implementing VMMs. One is a software-based approach that emulates the execution of virtual machines via software. The other is a hardware-based approach that utilizes the hardware virtualization support of CPUs. The software-based approach is preferred for implementing security mechanisms, whereas the hardware-based approach is preferred from the viewpoint of performance. In this paper, we present an approach to implementing a hybrid VMM for flexible and efficient security mechanisms. The hybrid VMM consists of a software-based VMM (QEMU) and hardware-based VMM (KVM), and it dynamically switches between them. Using the hybrid VMM, security- and reliability-critical software can be executed on the software-based VMM, and performance-critical software can be executed on the hardware-based VMM. We also present the results of experiments conducted to evaluate the performance and verify the effectiveness of the hybrid VMM.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129160665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quantitative Evaluation of Integrity for Remote System Using the Internet 基于Internet的远程系统完整性定量评价
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.13
M. Kitakami, Hiroshi Konno, K. Namba, Hideo Ito
Recently, the number of remote systems using the Internet has been increased and the services provided by such systems get various. They are required to have high dependability. The existing evaluations have some problems. For example, the evaluations based on RASIS are vague and those provided by Japanese government are very complicated. The existing evaluations are not uniformed, not understandable, and not quantitative. Especially, quantitative metric of integrity has not been proposed yet. This paper proposes quantitative metric for integrity for remote systems based on the Internet. It is also useful for evaluation of the effect of the measure against data destruction elements. This paper applies it to example systems in order to confirm its effectiveness.
近年来,利用Internet的远程系统越来越多,所提供的服务也越来越多样化。它们被要求具有高可靠性。现有的评价存在一些问题。例如,基于RASIS的评估是模糊的,日本政府提供的评估非常复杂。现有的评价不统一、不易懂、不定量。特别是完整性的定量度量尚未提出。本文提出了基于Internet的远程系统完整性的定量度量。它还可用于评估该措施对数据破坏元素的影响。本文将其应用于实例系统,以验证其有效性。
{"title":"Quantitative Evaluation of Integrity for Remote System Using the Internet","authors":"M. Kitakami, Hiroshi Konno, K. Namba, Hideo Ito","doi":"10.1109/PRDC.2010.13","DOIUrl":"https://doi.org/10.1109/PRDC.2010.13","url":null,"abstract":"Recently, the number of remote systems using the Internet has been increased and the services provided by such systems get various. They are required to have high dependability. The existing evaluations have some problems. For example, the evaluations based on RASIS are vague and those provided by Japanese government are very complicated. The existing evaluations are not uniformed, not understandable, and not quantitative. Especially, quantitative metric of integrity has not been proposed yet. This paper proposes quantitative metric for integrity for remote systems based on the Internet. It is also useful for evaluation of the effect of the measure against data destruction elements. This paper applies it to example systems in order to confirm its effectiveness.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133618124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data Generation 使用自动测试数据生成的基于安全测量的最坏情况执行时间估计
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.28
L. Kong, Jianhui Jiang
This paper proposes a new safe measurement-based estimation method for Worst-Case Execution Time (WCET) of programs in real-time systems. The latest progress in Pattern Recognition of learning to detect unseen object classes by between-class attribute transfer has been used for automatic test-data generation in our method. Based on control flow graph partition, execution profiles of each basic block and probabilities of their executions can be extracted during program executions driven by test data. Afterwards, a critical path can be identified by calculating its execution probability among all feasible paths. With measurement for critical paths, WCET can be obtained by adding static analysis of hardware features to measurement results. The objective of this paper is not to present finished or almost finished work. Instead we hope to trigger discussion and solicit feedback from the community in order to avoid pitfalls experienced by others and to help focus our research.
提出了一种新的基于安全测量的实时系统程序最坏情况执行时间估计方法。该方法将模式识别中学习通过类间属性转移来检测未见对象类的最新进展用于自动生成测试数据。基于控制流图划分,可以在测试数据驱动的程序执行过程中提取每个基本块的执行概况及其执行概率。然后,通过计算关键路径在所有可行路径中的执行概率来识别关键路径。通过对关键路径的测量,可以在测量结果中加入硬件特征的静态分析,从而获得WCET。本文的目的不是展示完成或接近完成的工作。相反,我们希望引发讨论并征求社区的反馈,以避免其他人经历的陷阱,并帮助我们集中研究。
{"title":"A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data Generation","authors":"L. Kong, Jianhui Jiang","doi":"10.1109/PRDC.2010.28","DOIUrl":"https://doi.org/10.1109/PRDC.2010.28","url":null,"abstract":"This paper proposes a new safe measurement-based estimation method for Worst-Case Execution Time (WCET) of programs in real-time systems. The latest progress in Pattern Recognition of learning to detect unseen object classes by between-class attribute transfer has been used for automatic test-data generation in our method. Based on control flow graph partition, execution profiles of each basic block and probabilities of their executions can be extracted during program executions driven by test data. Afterwards, a critical path can be identified by calculating its execution probability among all feasible paths. With measurement for critical paths, WCET can be obtained by adding static analysis of hardware features to measurement results. The objective of this paper is not to present finished or almost finished work. Instead we hope to trigger discussion and solicit feedback from the community in order to avoid pitfalls experienced by others and to help focus our research.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Core-Local Memory Assisted Protection 核心-本地内存辅助保护
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.48
Y. Kinebuchi, T. Nakajima, V. Ganapathy, L. Iftode
This paper proposes a method for protecting data by leveraging core-local memory. Core-local (or software coherency managed) memory is a programmable memory which is equipped in a core of multicore processors. It is accessible from the core with low latency compared to a shared cache and a shared main memory. This is equipped in multicore processors in order to exploit locality of threads and to improve scalability. In addition to low latency, core-local memory is invisible and inaccessible from the other cores. We leverage this characteristic to provide a novel mechanism of protecting an OS kernel beside MMU based address space separation.
本文提出了一种利用核心局部内存保护数据的方法。核心本地(或软件一致性管理)存储器是一种可编程存储器,它配备在多核处理器的核心中。与共享缓存和共享主存相比,它可以从核心访问,延迟较低。这是在多核处理器中配置的,以便利用线程的局部性并提高可伸缩性。除了低延迟之外,核心本地内存是不可见的,并且其他核心无法访问。我们利用这个特性提供了一种新的机制来保护基于MMU的地址空间分离之外的OS内核。
{"title":"Core-Local Memory Assisted Protection","authors":"Y. Kinebuchi, T. Nakajima, V. Ganapathy, L. Iftode","doi":"10.1109/PRDC.2010.48","DOIUrl":"https://doi.org/10.1109/PRDC.2010.48","url":null,"abstract":"This paper proposes a method for protecting data by leveraging core-local memory. Core-local (or software coherency managed) memory is a programmable memory which is equipped in a core of multicore processors. It is accessible from the core with low latency compared to a shared cache and a shared main memory. This is equipped in multicore processors in order to exploit locality of threads and to improve scalability. In addition to low latency, core-local memory is invisible and inaccessible from the other cores. We leverage this characteristic to provide a novel mechanism of protecting an OS kernel beside MMU based address space separation.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131664929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Decision Unit for the Pair and Swap Methodology within Chip Multiprocessors 芯片多处理器中对交换方法的有效决策单元
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.43
J. Weston, Masashi Imai, Tomohide Nagai, T. Nanya
The research presented in this paper details a number of further novel developments to a methodology known as “Pair and Swap”. Pair and Swap is a processor-level fault tolerance technique that enables graceful degradation in multi-core chips. The new developments are based around the introduction of a, hardware-based, decision unit into the system. The decision unit is a dependable solution to the problem of being able to reliably compare the comparison results of a pair of cores based on the current core pairings. The decision unit is determined to be more reliable, and efficient, than the cores due to the architectural simplicity it uses to perform the comparison, which is used to update eachcore’s configuration table. This paper will detail the complete decision unit implementation within the pair and swap methodology and show its ability to detect and gracefully degrade from both transient and permanent faults.
论文中提出的研究详细介绍了一种被称为“配对和交换”的方法的许多进一步的新发展。Pair和Swap是一种处理器级容错技术,可以在多核芯片中实现优雅的降级。新的发展是基于在系统中引入一个基于硬件的决策单元。决策单元是一种可靠的解决方案,能够在当前核对的基础上可靠地比较一对核的比较结果。决策单元被确定为比核心更可靠、更高效,因为它用于执行比较的体系结构简单性,用于更新每个核心的配置表。本文将详细介绍配对和交换方法中的完整决策单元实现,并展示其检测瞬时和永久故障并优雅地降级的能力。
{"title":"An Efficient Decision Unit for the Pair and Swap Methodology within Chip Multiprocessors","authors":"J. Weston, Masashi Imai, Tomohide Nagai, T. Nanya","doi":"10.1109/PRDC.2010.43","DOIUrl":"https://doi.org/10.1109/PRDC.2010.43","url":null,"abstract":"The research presented in this paper details a number of further novel developments to a methodology known as “Pair and Swap”. Pair and Swap is a processor-level fault tolerance technique that enables graceful degradation in multi-core chips. The new developments are based around the introduction of a, hardware-based, decision unit into the system. The decision unit is a dependable solution to the problem of being able to reliably compare the comparison results of a pair of cores based on the current core pairings. The decision unit is determined to be more reliable, and efficient, than the cores due to the architectural simplicity it uses to perform the comparison, which is used to update eachcore’s configuration table. This paper will detail the complete decision unit implementation within the pair and swap methodology and show its ability to detect and gracefully degrade from both transient and permanent faults.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks 基于学习的保护Web服务免受SQL/XPath注入攻击的方法
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.24
N. Laranjeiro, M. Vieira, H. Madeira
Business critical applications are increasingly being deployed as web services that access database systems, and must provide secure operations to its clients. Although the open web environment emphasizes the need for security, several studies show that web services are still being deployed with command injection vulnerabilities. This paper proposes a learning-based approach to secure web services against SQL and XPath Injection attacks. Our approach is able to transparently learn valid request patterns (learning phase) and then detect and abort potentially harmful requests (protection phase). When it is not possible to have a complete learning phase, a set of heuristics can be used to accept/discard doubtful cases. Our mechanism was applied to secure TPC-App services and open source services. It showed to be extremely effective in stopping all tested attacks, while introducing a negligible performance impact.
业务关键型应用程序越来越多地被部署为访问数据库系统的web服务,并且必须为其客户端提供安全操作。尽管开放的web环境强调了对安全性的需求,但一些研究表明,web服务仍然存在命令注入漏洞。本文提出了一种基于学习的方法来保护web服务免受SQL和XPath注入攻击。我们的方法能够透明地学习有效的请求模式(学习阶段),然后检测和终止潜在的有害请求(保护阶段)。当不可能有一个完整的学习阶段时,可以使用一组启发式来接受/丢弃可疑的情况。我们的机制被应用于保护TPC-App服务和开源服务。它在阻止所有被测试的攻击方面非常有效,同时对性能的影响可以忽略不计。
{"title":"A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks","authors":"N. Laranjeiro, M. Vieira, H. Madeira","doi":"10.1109/PRDC.2010.24","DOIUrl":"https://doi.org/10.1109/PRDC.2010.24","url":null,"abstract":"Business critical applications are increasingly being deployed as web services that access database systems, and must provide secure operations to its clients. Although the open web environment emphasizes the need for security, several studies show that web services are still being deployed with command injection vulnerabilities. This paper proposes a learning-based approach to secure web services against SQL and XPath Injection attacks. Our approach is able to transparently learn valid request patterns (learning phase) and then detect and abort potentially harmful requests (protection phase). When it is not possible to have a complete learning phase, a set of heuristics can be used to accept/discard doubtful cases. Our mechanism was applied to secure TPC-App services and open source services. It showed to be extremely effective in stopping all tested attacks, while introducing a negligible performance impact.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1