首页 > 最新文献

arXiv - CS - Operating Systems最新文献

英文 中文
Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection Laccolith:基于管理程序的对手仿真与反检测
Pub Date : 2023-11-14 DOI: arxiv-2311.08274
Vittorio Orbinato, Marco Carlo Feliciano, Domenico Cotroneo, Roberto Natella
Advanced Persistent Threats (APTs) represent the most threatening form ofattack nowadays since they can stay undetected for a long time. Adversaryemulation is a proactive approach for preparing against these attacks. However,adversary emulation tools lack the anti-detection abilities of APTs. Weintroduce Laccolith, a hypervisor-based solution for adversary emulation withanti-detection to fill this gap. We also present an experimental study tocompare Laccolith with MITRE CALDERA, a state-of-the-art solution for adversaryemulation, against five popular anti-virus products. We found that CALDERAcannot evade detection, limiting the realism of emulated attacks, even whencombined with a state-of-the-art anti-detection framework. Our experiments showthat Laccolith can hide its activities from all the tested anti-virus products,thus making it suitable for realistic emulations.
高级持续性威胁(apt)是当今最具威胁性的攻击形式,因为它们可以在很长一段时间内不被发现。对手模拟是针对这些攻击进行准备的主动方法。然而,对手模拟工具缺乏apt的反检测能力。我们引入Laccolith,这是一种基于管理程序的解决方案,用于对手模拟和反检测,以填补这一空白。我们还提出了一项实验研究,将Laccolith与MITRE CALDERA(对抗仿真的最先进解决方案)与五种流行的杀毒产品进行比较。我们发现,即使与最先进的反检测框架相结合,caldera也无法逃避检测,从而限制了模拟攻击的真实性。我们的实验表明,Laccolith可以对所有被测试的杀毒产品隐藏其活性,从而使其适合于真实的模拟。
{"title":"Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection","authors":"Vittorio Orbinato, Marco Carlo Feliciano, Domenico Cotroneo, Roberto Natella","doi":"arxiv-2311.08274","DOIUrl":"https://doi.org/arxiv-2311.08274","url":null,"abstract":"Advanced Persistent Threats (APTs) represent the most threatening form of\u0000attack nowadays since they can stay undetected for a long time. Adversary\u0000emulation is a proactive approach for preparing against these attacks. However,\u0000adversary emulation tools lack the anti-detection abilities of APTs. We\u0000introduce Laccolith, a hypervisor-based solution for adversary emulation with\u0000anti-detection to fill this gap. We also present an experimental study to\u0000compare Laccolith with MITRE CALDERA, a state-of-the-art solution for adversary\u0000emulation, against five popular anti-virus products. We found that CALDERA\u0000cannot evade detection, limiting the realism of emulated attacks, even when\u0000combined with a state-of-the-art anti-detection framework. Our experiments show\u0000that Laccolith can hide its activities from all the tested anti-virus products,\u0000thus making it suitable for realistic emulations.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"154 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CARTOS: A Charging-Aware Real-Time Operating System for Intermittent Batteryless Devices 用于间歇性无电池设备的充电感知实时操作系统
Pub Date : 2023-11-13 DOI: arxiv-2311.07227
Mohsen Karimi, Yidi Wang, Youngbin Kim, Yoojin Lim, Hyoseung Kim
This paper presents CARTOS, a charging-aware real-time operating systemdesigned to enhance the functionality of intermittently-powered batterylessdevices (IPDs) for various Internet of Things (IoT) applications. While IPDsoffer significant advantages such as extended lifespan and operability inextreme environments, they pose unique challenges, including the need to ensureforward progress of program execution amidst variable energy availability andmaintaining reliable real-time time behavior during power disruptions. Toaddress these challenges, CARTOS introduces a mixed-preemption scheduling modelthat classifies tasks into computational and peripheral tasks, and ensurestheir efficient and timely execution by adopting just-in-time checkpointing fordivisible computation tasks and uninterrupted execution for indivisibleperipheral tasks. CARTOS also supports processing chains of tasks withprecedence constraints and adapts its scheduling in response to environmentalchanges to offer continuous execution under diverse conditions. CARTOS isimplemented with new APIs and components added to FreeRTOS but is designed forportability to other embedded RTOSs. Through real hardware experiments andsimulations, CARTOS exhibits superior performance over state-of-the-artmethods, demonstrating that it can serve as a practical platform for developingresilient, real-time sensing applications on IPDs.
本文介绍了一种充电感知实时操作系统,旨在增强各种物联网(IoT)应用中间歇性供电的无电池设备(ipd)的功能。虽然ipdso具有显著的优势,如延长使用寿命和在极端环境下的可操作性,但它们也带来了独特的挑战,包括需要确保在可变能源可用性下程序执行的向前进展,以及在电力中断期间保持可靠的实时行为。为了应对这些挑战,CARTOS引入了一种混合抢占调度模型,该模型将任务分为计算任务和外围任务,并通过对可分计算任务采用即时检查点和对不可分外围任务采用不间断执行来确保任务的高效及时执行。CARTOS还支持具有优先级约束的任务处理链,并根据环境变化调整其调度,以在不同条件下提供连续执行。CARTOS是通过添加到FreeRTOS中的新api和组件实现的,但其设计是为了可移植到其他嵌入式rtos中。通过真实的硬件实验和模拟,CARTOS表现出优于最先进方法的性能,证明它可以作为开发ipd上弹性实时传感应用的实用平台。
{"title":"CARTOS: A Charging-Aware Real-Time Operating System for Intermittent Batteryless Devices","authors":"Mohsen Karimi, Yidi Wang, Youngbin Kim, Yoojin Lim, Hyoseung Kim","doi":"arxiv-2311.07227","DOIUrl":"https://doi.org/arxiv-2311.07227","url":null,"abstract":"This paper presents CARTOS, a charging-aware real-time operating system\u0000designed to enhance the functionality of intermittently-powered batteryless\u0000devices (IPDs) for various Internet of Things (IoT) applications. While IPDs\u0000offer significant advantages such as extended lifespan and operability in\u0000extreme environments, they pose unique challenges, including the need to ensure\u0000forward progress of program execution amidst variable energy availability and\u0000maintaining reliable real-time time behavior during power disruptions. To\u0000address these challenges, CARTOS introduces a mixed-preemption scheduling model\u0000that classifies tasks into computational and peripheral tasks, and ensures\u0000their efficient and timely execution by adopting just-in-time checkpointing for\u0000divisible computation tasks and uninterrupted execution for indivisible\u0000peripheral tasks. CARTOS also supports processing chains of tasks with\u0000precedence constraints and adapts its scheduling in response to environmental\u0000changes to offer continuous execution under diverse conditions. CARTOS is\u0000implemented with new APIs and components added to FreeRTOS but is designed for\u0000portability to other embedded RTOSs. Through real hardware experiments and\u0000simulations, CARTOS exhibits superior performance over state-of-the-art\u0000methods, demonstrating that it can serve as a practical platform for developing\u0000resilient, real-time sensing applications on IPDs.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OpenBSD formal driver verification with SeL4 使用SeL4的OpenBSD正式驱动程序验证
Pub Date : 2023-11-06 DOI: arxiv-2311.03585
Adriana Nicolae, Paul Irofti, Ioana Leustean
The seL4 microkernel is currently the only kernel that has been fullyformally verified. In general, the increased interest in ensuring the securityof a kernel's code results from its important role in the entire operatingsystem. One of the basic features of an operating system is that it abstractsthe handling of devices. This abstraction is represented by device drivers -the software that manages the hardware. A proper verification of the softwarecomponent could ensure that the device would work properly unless there is ahardware failure.In this paper, we choose to model the behavior of a devicedriver and build the proof that the code implementation matches the expectedbehavior. The proof was written in Isabelle/HOL, the code translation from C toIsabelle was done automatically by the use of the C-to-Isabelle Parser andAutoCorres tools. We choose Isabelle theorem prover because its efficiency wasalready shown through the verification of seL4 microkernel.
seL4微内核是目前唯一经过正式验证的内核。通常,由于内核代码在整个操作系统中的重要作用,对确保内核代码安全性的兴趣越来越大。操作系统的一个基本特征是对设备的抽象处理。这种抽象由设备驱动程序(管理硬件的软件)表示。对软件组件进行适当的验证可以确保设备正常工作,除非出现硬件故障。在本文中,我们选择对设备驱动程序的行为进行建模,并构建代码实现与预期行为匹配的证明。证明是用Isabelle/HOL编写的,从C到Isabelle的代码翻译是通过使用C到Isabelle解析器和autocorres工具自动完成的。我们之所以选择Isabelle定理证明器,是因为它的有效性已经通过seL4微内核的验证得到了体现。
{"title":"OpenBSD formal driver verification with SeL4","authors":"Adriana Nicolae, Paul Irofti, Ioana Leustean","doi":"arxiv-2311.03585","DOIUrl":"https://doi.org/arxiv-2311.03585","url":null,"abstract":"The seL4 microkernel is currently the only kernel that has been fully\u0000formally verified. In general, the increased interest in ensuring the security\u0000of a kernel's code results from its important role in the entire operating\u0000system. One of the basic features of an operating system is that it abstracts\u0000the handling of devices. This abstraction is represented by device drivers -\u0000the software that manages the hardware. A proper verification of the software\u0000component could ensure that the device would work properly unless there is a\u0000hardware failure.In this paper, we choose to model the behavior of a device\u0000driver and build the proof that the code implementation matches the expected\u0000behavior. The proof was written in Isabelle/HOL, the code translation from C to\u0000Isabelle was done automatically by the use of the C-to-Isabelle Parser and\u0000AutoCorres tools. We choose Isabelle theorem prover because its efficiency was\u0000already shown through the verification of seL4 microkernel.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pinky: A Modern Malware-oriented Dynamic Information Retrieval Tool Pinky:一个现代的面向恶意软件的动态信息检索工具
Pub Date : 2023-11-06 DOI: arxiv-2311.03588
Paul Irofti
We present here a reverse engineering tool that can be used for informationretrieval and anti-malware techniques. Our main contribution is the design andimplementation of an instrumentation framework aimed at providing insight onthe emulation process. Sample emulation is achieved via translation of thebinary code to an intermediate representation followed by compilation andexecution. The design makes this a versatile tool that can be used for multipletask such as information retrieval, reverse engineering, debugging, andintegration with anti-malware products.
我们在这里提出了一个逆向工程工具,可用于信息检索和反恶意软件技术。我们的主要贡献是设计和实现了一个仪表框架,旨在深入了解仿真过程。示例仿真是通过将二进制代码转换为中间表示,然后进行编译和执行来实现的。该设计使其成为一个多功能工具,可用于多任务,如信息检索、逆向工程、调试和与反恶意软件产品集成。
{"title":"Pinky: A Modern Malware-oriented Dynamic Information Retrieval Tool","authors":"Paul Irofti","doi":"arxiv-2311.03588","DOIUrl":"https://doi.org/arxiv-2311.03588","url":null,"abstract":"We present here a reverse engineering tool that can be used for information\u0000retrieval and anti-malware techniques. Our main contribution is the design and\u0000implementation of an instrumentation framework aimed at providing insight on\u0000the emulation process. Sample emulation is achieved via translation of the\u0000binary code to an intermediate representation followed by compilation and\u0000execution. The design makes this a versatile tool that can be used for multiple\u0000task such as information retrieval, reverse engineering, debugging, and\u0000integration with anti-malware products.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOSEL: Inference Serving Using Dynamic Modality Selection MOSEL:使用动态模态选择的推理服务
Pub Date : 2023-10-27 DOI: arxiv-2310.18481
Bodun Hu, Le Xu, Jeongyoon Moon, Neeraja J. Yadwadkar, Aditya Akella
Rapid advancements over the years have helped machine learning models reachpreviously hard-to-achieve goals, sometimes even exceeding human capabilities.However, to attain the desired accuracy, the model sizes and in turn theircomputational requirements have increased drastically. Thus, servingpredictions from these models to meet any target latency and cost requirementsof applications remains a key challenge, despite recent work in buildinginference-serving systems as well as algorithmic approaches that dynamicallyadapt models based on inputs. In this paper, we introduce a form of dynamism,modality selection, where we adaptively choose modalities from inference inputswhile maintaining the model quality. We introduce MOSEL, an automated inferenceserving system for multi-modal ML models that carefully picks input modalitiesper request based on user-defined performance and accuracy requirements. MOSELexploits modality configurations extensively, improving system throughput by3.6$times$ with an accuracy guarantee and shortening job completion times by11$times$.
多年来的快速发展帮助机器学习模型实现了以前难以实现的目标,有时甚至超过了人类的能力。然而,为了达到期望的精度,模型的大小和它们的计算需求急剧增加。因此,尽管最近在构建推理服务系统以及基于输入动态调整模型的算法方法方面的工作,但从这些模型中提供预测以满足应用程序的任何目标延迟和成本要求仍然是一个关键挑战。在本文中,我们引入了一种动态形式,模态选择,在保持模型质量的同时,我们自适应地从推理输入中选择模态。我们介绍了MOSEL,这是一个针对多模态ML模型的自动推理服务系统,它根据用户定义的性能和精度要求仔细选择每个请求的输入模态。mosel广泛利用了模态配置,在保证精度的同时将系统吞吐量提高了3.6倍,并将作业完成时间缩短了11倍。
{"title":"MOSEL: Inference Serving Using Dynamic Modality Selection","authors":"Bodun Hu, Le Xu, Jeongyoon Moon, Neeraja J. Yadwadkar, Aditya Akella","doi":"arxiv-2310.18481","DOIUrl":"https://doi.org/arxiv-2310.18481","url":null,"abstract":"Rapid advancements over the years have helped machine learning models reach\u0000previously hard-to-achieve goals, sometimes even exceeding human capabilities.\u0000However, to attain the desired accuracy, the model sizes and in turn their\u0000computational requirements have increased drastically. Thus, serving\u0000predictions from these models to meet any target latency and cost requirements\u0000of applications remains a key challenge, despite recent work in building\u0000inference-serving systems as well as algorithmic approaches that dynamically\u0000adapt models based on inputs. In this paper, we introduce a form of dynamism,\u0000modality selection, where we adaptively choose modalities from inference inputs\u0000while maintaining the model quality. We introduce MOSEL, an automated inference\u0000serving system for multi-modal ML models that carefully picks input modalities\u0000per request based on user-defined performance and accuracy requirements. MOSEL\u0000exploits modality configurations extensively, improving system throughput by\u00003.6$times$ with an accuracy guarantee and shortening job completion times by\u000011$times$.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"2 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of the Security Challenges and Requirements for IoT Operating Systems 物联网操作系统的安全挑战和需求调查
Pub Date : 2023-10-27 DOI: arxiv-2310.19825
Alvi Jawad
The Internet of Things (IoT) is becoming an integral part of our modern livesas we converge towards a world surrounded by ubiquitous connectivity. Theinherent complexity presented by the vast IoT ecosystem ends up in aninsufficient understanding of individual system components and theirinteractions, leading to numerous security challenges. In order to create asecure IoT platform from the ground up, there is a need for a unifyingoperating system (OS) that can act as a cornerstone regulating the developmentof stable and secure solutions. In this paper, we present a classification ofthe security challenges stemming from the manifold aspects of IoT development.We also specify security requirements to direct the secure development of anunifying IoT OS to resolve many of those ensuing challenges. Survey of severalmodern IoT OSs confirm that while the developers of the OSs have taken manyalternative approaches to implement security, we are far from engineering anadequately secure and unified architecture. More broadly, the study presentedin this paper can help address the growing need for a secure and unifiedplatform to base IoT development on and assure the safe, secure, and reliableoperation of IoT in critical domains.
物联网(IoT)正在成为我们现代生活中不可或缺的一部分,因为我们正在向无处不在的连接所包围的世界融合。庞大的物联网生态系统所呈现的固有复杂性最终导致对单个系统组件及其交互的理解不足,从而导致许多安全挑战。为了从头开始创建一个安全的物联网平台,需要一个统一的操作系统(OS),它可以作为规范稳定和安全解决方案开发的基石。在本文中,我们提出了来自物联网发展的多个方面的安全挑战的分类。我们还指定了安全要求,以指导统一物联网操作系统的安全开发,以解决许多随之而来的挑战。对几个现代物联网操作系统的调查证实,虽然操作系统的开发人员已经采取了许多替代方法来实现安全性,但我们还远远没有设计出足够安全和统一的架构。更广泛地说,本文提出的研究可以帮助解决日益增长的对安全统一平台的需求,以基础物联网发展,并确保物联网在关键领域的安全、可靠和可靠运行。
{"title":"A Survey of the Security Challenges and Requirements for IoT Operating Systems","authors":"Alvi Jawad","doi":"arxiv-2310.19825","DOIUrl":"https://doi.org/arxiv-2310.19825","url":null,"abstract":"The Internet of Things (IoT) is becoming an integral part of our modern lives\u0000as we converge towards a world surrounded by ubiquitous connectivity. The\u0000inherent complexity presented by the vast IoT ecosystem ends up in an\u0000insufficient understanding of individual system components and their\u0000interactions, leading to numerous security challenges. In order to create a\u0000secure IoT platform from the ground up, there is a need for a unifying\u0000operating system (OS) that can act as a cornerstone regulating the development\u0000of stable and secure solutions. In this paper, we present a classification of\u0000the security challenges stemming from the manifold aspects of IoT development.\u0000We also specify security requirements to direct the secure development of an\u0000unifying IoT OS to resolve many of those ensuing challenges. Survey of several\u0000modern IoT OSs confirm that while the developers of the OSs have taken many\u0000alternative approaches to implement security, we are far from engineering an\u0000adequately secure and unified architecture. More broadly, the study presented\u0000in this paper can help address the growing need for a secure and unified\u0000platform to base IoT development on and assure the safe, secure, and reliable\u0000operation of IoT in critical domains.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"2 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proving the Absence of Microarchitectural Timing Channels 证明微架构时间通道的缺失
Pub Date : 2023-10-25 DOI: arxiv-2310.17046
Scott BuckleyUNSW Sydney, Robert SisonUNSW SydneyUniversity of Melbourne, Nils WistoffETH Zürich, Curtis MillarUNSW Sydney, Toby MurrayUniversity of Melbourne, Gerwin KleinProofcraftUNSW Sydney, Gernot HeiserUNSW Sydney
Microarchitectural timing channels are a major threat to computer security. Aset of OS mechanisms called time protection was recently proposed as aprincipled way of preventing information leakage through such channels andprototyped in the seL4 microkernel. We formalise time protection and theunderlying hardware mechanisms in a way that allows linking them to theinformation-flow proofs that showed the absence of storage channels in seL4.
微体系结构定时信道是对计算机安全的主要威胁。一套称为时间保护的操作系统机制最近被提出,作为防止通过这些通道泄露信息的原则方法,并在seL4微内核中原型化。我们将时间保护和底层硬件机制形式化,以允许将它们链接到显示seL4中缺乏存储通道的信息流证明。
{"title":"Proving the Absence of Microarchitectural Timing Channels","authors":"Scott BuckleyUNSW Sydney, Robert SisonUNSW SydneyUniversity of Melbourne, Nils WistoffETH Zürich, Curtis MillarUNSW Sydney, Toby MurrayUniversity of Melbourne, Gerwin KleinProofcraftUNSW Sydney, Gernot HeiserUNSW Sydney","doi":"arxiv-2310.17046","DOIUrl":"https://doi.org/arxiv-2310.17046","url":null,"abstract":"Microarchitectural timing channels are a major threat to computer security. A\u0000set of OS mechanisms called time protection was recently proposed as a\u0000principled way of preventing information leakage through such channels and\u0000prototyped in the seL4 microkernel. We formalise time protection and the\u0000underlying hardware mechanisms in a way that allows linking them to the\u0000information-flow proofs that showed the absence of storage channels in seL4.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Snapshot: Fast, Userspace Crash Consistency for CXL and PM Using msync 快照:快速,用户空间崩溃一致性的CXL和PM使用msync
Pub Date : 2023-10-25 DOI: arxiv-2310.16300
Suyash Mahar, Mingyao Shen, Terence Kelly, Steven Swanson
Crash consistency using persistent memory programming libraries requiresprogrammers to use complex transactions and manual annotations. In contrast,the failure-atomic msync() (FAMS) interface is much simpler as it transparentlytracks updates and guarantees that modified data is atomically durable on acall to the failure-atomic variant of msync(). However, FAMS suffers fromseveral drawbacks, like the overhead of msync() and the write amplificationfrom page-level dirty data tracking. To address these drawbacks while preserving the advantages of FAMS, wepropose Snapshot, an efficient userspace implementation of FAMS. Snapshot uses compiler-based annotation to transparently track updates inuserspace and syncs them with the backing byte-addressable storage copy on acall to msync(). By keeping a copy of application data in DRAM, Snapshotimproves access latency. Moreover, with automatic tracking and syncing changesonly on a call to msync(), Snapshot provides crash-consistency guarantees,unlike the POSIX msync() system call. For a KV-Store backed by Intel Optane running the YCSB benchmark, Snapshotachieves at least 1.2$times$ speedup over PMDK while significantlyoutperforming conventional (non-crash-consistent) msync(). On an emulated CXLmemory semantic SSD, Snapshot outperforms PMDK by up to 10.9$times$ on all butone YCSB workload, where PMDK is 1.2$times$ faster than Snapshot. Further,Kyoto Cabinet commits perform up to 8.0$times$ faster with Snapshot than itsbuilt-in, msync()-based crash-consistency mechanism.
使用持久内存编程库的崩溃一致性要求程序员使用复杂的事务和手动注释。相比之下,故障原子msync() (FAMS)接口要简单得多,因为它透明地跟踪更新并保证在调用msync()的故障原子变体时修改的数据是原子持久的。然而,FAMS有几个缺点,比如msync()的开销和页级脏数据跟踪带来的写放大。为了在保留FAMS优点的同时解决这些缺点,我们提出了快照,一种有效的FAMS用户空间实现。Snapshot使用基于编译器的注释透明地跟踪用户空间中的更新,并在调用msync()时将它们与后备字节可寻址存储副本同步。通过在DRAM中保存应用程序数据的副本,snapsho改善了访问延迟。此外,与POSIX的msync()系统调用不同,Snapshot只在调用msync()时自动跟踪和同步更改,从而提供了崩溃一致性保证。对于运行YCSB基准测试的Intel Optane支持的KV-Store, snapshot在PMDK上实现了至少1.2倍的加速,同时显著优于传统的(非崩溃一致)msync()。在模拟的CXLmemory语义SSD上,Snapshot在所有单个YCSB工作负载上的性能优于PMDK高达10.9$times$,其中PMDK比Snapshot快1.2$times$。此外,京都内阁提交的执行速度比其内置的基于msync()的崩溃一致性机制快8.0倍。
{"title":"Snapshot: Fast, Userspace Crash Consistency for CXL and PM Using msync","authors":"Suyash Mahar, Mingyao Shen, Terence Kelly, Steven Swanson","doi":"arxiv-2310.16300","DOIUrl":"https://doi.org/arxiv-2310.16300","url":null,"abstract":"Crash consistency using persistent memory programming libraries requires\u0000programmers to use complex transactions and manual annotations. In contrast,\u0000the failure-atomic msync() (FAMS) interface is much simpler as it transparently\u0000tracks updates and guarantees that modified data is atomically durable on a\u0000call to the failure-atomic variant of msync(). However, FAMS suffers from\u0000several drawbacks, like the overhead of msync() and the write amplification\u0000from page-level dirty data tracking. To address these drawbacks while preserving the advantages of FAMS, we\u0000propose Snapshot, an efficient userspace implementation of FAMS. Snapshot uses compiler-based annotation to transparently track updates in\u0000userspace and syncs them with the backing byte-addressable storage copy on a\u0000call to msync(). By keeping a copy of application data in DRAM, Snapshot\u0000improves access latency. Moreover, with automatic tracking and syncing changes\u0000only on a call to msync(), Snapshot provides crash-consistency guarantees,\u0000unlike the POSIX msync() system call. For a KV-Store backed by Intel Optane running the YCSB benchmark, Snapshot\u0000achieves at least 1.2$times$ speedup over PMDK while significantly\u0000outperforming conventional (non-crash-consistent) msync(). On an emulated CXL\u0000memory semantic SSD, Snapshot outperforms PMDK by up to 10.9$times$ on all but\u0000one YCSB workload, where PMDK is 1.2$times$ faster than Snapshot. Further,\u0000Kyoto Cabinet commits perform up to 8.0$times$ faster with Snapshot than its\u0000built-in, msync()-based crash-consistency mechanism.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"322 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive CPU Resource Allocation for Emulator in Kernel-based Virtual Machine 基于内核的虚拟机仿真器的自适应CPU资源分配
Pub Date : 2023-10-23 DOI: arxiv-2310.14741
Yecheng Yang, Pu Pang, Jiawen Wang, Quan Chen, Minyi Guo
The technologies of heterogeneous multi-core architectures, co-location, andvirtualization can be used to reduce server power consumption and improvesystem utilization, which are three important technologies for data centers.This article explores the scheduling strategy of Emulator threads withinvirtual machine processes in a scenario of co-location of multiple virtualmachines on heterogeneous multi-core architectures. In this co-locationscenario, the scheduling strategy for Emulator threads significantly affectsthe performance of virtual machines. This article focuses on this thread forthe first time in the relevant field. This article found that the schedulinglatency metric can well indicate the running status of the vCPU threads andEmulator threads in the virtualization environment, and applied this metric tothe design of the scheduling strategy. This article designed an Emulator threadscheduler based on heuristic rules, which, in coordination with the hostoperating system's scheduler, dynamically adjusts the scheduling scope ofEmulator threads to improve the overall performance of virtual machines. Thearticle found that in real application scenarios, the scheduler effectivelyimproved the performance of applications within virtual machines, with amaximum performance improvement of 40.7%.
异构多核架构技术、协同位置技术和虚拟化技术可以降低服务器功耗和提高系统利用率,这是数据中心的三种重要技术。本文探讨了在异构多核架构上多虚拟机共存场景下,模拟器线程在虚拟机进程中的调度策略。在这种协同位置场景中,模拟器线程的调度策略会显著影响虚拟机的性能。本文在相关领域首次对这一主题进行了探讨。本文发现调度延迟指标可以很好地反映虚拟化环境中vCPU线程和模拟器线程的运行状态,并将该指标应用于调度策略的设计。本文设计了一个基于启发式规则的模拟器线程调度器,该调度器与主机操作系统的调度器协同,动态调整模拟器线程的调度范围,以提高虚拟机的整体性能。本文发现,在实际应用场景中,调度器有效地提高了虚拟机内应用程序的性能,最大性能提高了40.7%。
{"title":"Adaptive CPU Resource Allocation for Emulator in Kernel-based Virtual Machine","authors":"Yecheng Yang, Pu Pang, Jiawen Wang, Quan Chen, Minyi Guo","doi":"arxiv-2310.14741","DOIUrl":"https://doi.org/arxiv-2310.14741","url":null,"abstract":"The technologies of heterogeneous multi-core architectures, co-location, and\u0000virtualization can be used to reduce server power consumption and improve\u0000system utilization, which are three important technologies for data centers.\u0000This article explores the scheduling strategy of Emulator threads within\u0000virtual machine processes in a scenario of co-location of multiple virtual\u0000machines on heterogeneous multi-core architectures. In this co-location\u0000scenario, the scheduling strategy for Emulator threads significantly affects\u0000the performance of virtual machines. This article focuses on this thread for\u0000the first time in the relevant field. This article found that the scheduling\u0000latency metric can well indicate the running status of the vCPU threads and\u0000Emulator threads in the virtualization environment, and applied this metric to\u0000the design of the scheduling strategy. This article designed an Emulator thread\u0000scheduler based on heuristic rules, which, in coordination with the host\u0000operating system's scheduler, dynamically adjusts the scheduling scope of\u0000Emulator threads to improve the overall performance of virtual machines. The\u0000article found that in real application scenarios, the scheduler effectively\u0000improved the performance of applications within virtual machines, with a\u0000maximum performance improvement of 40.7%.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"14 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GMEM: Generalized Memory Management for Peripheral Devices 外围设备的通用内存管理
Pub Date : 2023-10-19 DOI: arxiv-2310.12554
Weixi Zhu, Alan L. Cox, Scott Rixner
This paper presents GMEM, generalized memory management, for peripheraldevices. GMEM provides OS support for centralized memory management of both CPUand devices. GMEM provides a high-level interface that decouples MMU-specificfunctions. Device drivers can thus attach themselves to a process's addressspace and let the OS take charge of their memory management. This eliminatesthe need for device drivers to "reinvent the wheel" and allows them to benefitfrom general memory optimizations integrated by GMEM. Furthermore, GMEMinternally coordinates all attached devices within each virtual address space.This drastically improves user-level programmability, since programmers can usea single address space within their program, even when operating across the CPUand multiple devices. A case study on device drivers demonstrates thesebenefits. A GMEM-based IOMMU driver eliminates around seven hundred lines ofcode and obtains 54% higher network receive throughput utilizing 32% less CPUcompared to the state-of-the-art. In addition, the GMEM-based driver of asimulated GPU takes less than 70 lines of code, excluding its MMU functions.
本文提出了一种用于外围设备的通用内存管理方法GMEM。GMEM为cpu和设备的集中内存管理提供操作系统支持。GMEM提供了一个高级接口来解耦mmu特定的函数。因此,设备驱动程序可以将自己附加到进程的地址空间,并让操作系统负责它们的内存管理。这消除了设备驱动程序“重新发明轮子”的需要,并允许它们从GMEM集成的通用内存优化中受益。此外,gmems在内部协调每个虚拟地址空间中的所有附加设备。这极大地提高了用户级的可编程性,因为程序员可以在他们的程序中使用单个地址空间,即使在跨cpu和多个设备操作时也是如此。一个关于设备驱动程序的案例研究证明了这些好处。基于gmm的IOMMU驱动程序消除了大约700行代码,并且使用比最先进的cpu少32%的cpu获得了54%的高网络接收吞吐量。此外,基于gmm的仿真GPU驱动程序的代码少于70行,不包括其MMU功能。
{"title":"GMEM: Generalized Memory Management for Peripheral Devices","authors":"Weixi Zhu, Alan L. Cox, Scott Rixner","doi":"arxiv-2310.12554","DOIUrl":"https://doi.org/arxiv-2310.12554","url":null,"abstract":"This paper presents GMEM, generalized memory management, for peripheral\u0000devices. GMEM provides OS support for centralized memory management of both CPU\u0000and devices. GMEM provides a high-level interface that decouples MMU-specific\u0000functions. Device drivers can thus attach themselves to a process's address\u0000space and let the OS take charge of their memory management. This eliminates\u0000the need for device drivers to \"reinvent the wheel\" and allows them to benefit\u0000from general memory optimizations integrated by GMEM. Furthermore, GMEM\u0000internally coordinates all attached devices within each virtual address space.\u0000This drastically improves user-level programmability, since programmers can use\u0000a single address space within their program, even when operating across the CPU\u0000and multiple devices. A case study on device drivers demonstrates these\u0000benefits. A GMEM-based IOMMU driver eliminates around seven hundred lines of\u0000code and obtains 54% higher network receive throughput utilizing 32% less CPU\u0000compared to the state-of-the-art. In addition, the GMEM-based driver of a\u0000simulated GPU takes less than 70 lines of code, excluding its MMU functions.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"64 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Operating Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1