37 research outputs found

    Source level debugging of dynamically translated programs

    Get PDF
    The capability to debug a program at the source level is useful and often indispensable. Debuggers usesophisticated techniques to provide a source view of a program, even though what is executing on the hard-ware is machine code. Debugging techniques evolve with significant changes in programming languagesand execution environments. Recently, software dynamic translation (SDT) has emerged as a new execu-tion mechanism. SDT inserts a run-time software layer between the program and the host machine, provid-ing flexibility in execution and program monitoring. Increasingly popular technologies that use thismechanism include dynamic optimization, dynamic instrumentation, security checking, binary translation,and host machine virtualization. However, the run-time program modifications in a SDT environment posesignificant challenges to a source level debugger. Currently debugging techniques do not exist for softwaredynamic translators. This thesis is the first to provide techniques for source level debugging of dynamically translatedprograms. The thesis proposes a novel debugging framework, called Tdb, that addresses the difficult chal-lenge of maintaining and providing source level information for programs whose binary code changes asthe program executes. The proposed framework has a number of important features. First, it does notrequire or induce changes in the program being debugged. In other words, programs are debugged is theirdeployment environment. Second, the framework is portable and can be applied to virtually any SDT sys-tem. The framework requires minimal changes to an SDT implementation, usually just a few lines of code.Third, the framework can be integrated with existing debuggers, such as Gdb, and does not require changesto these debuggers. This improves usability and adoption, eliminating the learning curve associated with anew debugging environment. Finally, the proposed techniques are efficient. The runtime overhead of thedebugged programs is low and comparable to that of existing debuggers. Tdb's techniques have been implemented for three different dynamic translators, on two differenthardware platforms. The experimental results demonstrate that source level debugging of dynamicallytranslated programs is feasible, and our implemented systems are portable, usable, and efficient

    A Novel Design for Advanced 5G Deployment Environments with Virtualized Resources at Vehicular and MEC Nodes

    Full text link
    IoT and edge computing are profoundly changing the information era, bringing a hyper-connected and context-aware computing environment to reality. Connected vehicles are a critical outcome of this synergy, allowing for the seamless interconnection of autonomous mobile/fixed objects, giving rise to a decentralized vehicle-to-everything (V2X) paradigm. On this front, the European Telecommunications Standards Institute (ETSI) proposed the Multi-Access Edge Computing (MEC) standard, addressing the execution of cloud-like services at the very edge of the infrastructure, thus facilitating the support of low-latency services at the far-edge. In this article, we go a step further and propose a novel ETSI MEC-compliant architecture that fully exploits the synergies between the edge and far-edge, extending the pool of virtualized resources available at MEC nodes with vehicular ones found in the vicinity. In particular, our approach allows vehicle entities to access and partake in a negotiation process embodying a rewarding scheme, while addressing resource volatility as vehicles join and leave the resource pool. To demonstrate the viability and flexibility of our proposed approach, we have built an ETSI MEC-compliant simulation model, which could be tailored to distribute application requests based on the availability of both local and remote resources, managing their transparent migration and execution. In addition, the paper reports on the experimental validation of our proposal in a 5G network setting, contrasting different service delivery modes, by highlighting the potential of the dynamic exploitation of far-edge vehicular resources

    ENGLISH TEACHERS’ PERCEPTION ON PRACTICALITY AND USEFULNESS OF ONLINE LEARNING DURING THE COVID-19 PANDEMIC AT TWO JUNIOR HIGH SCHOOLS

    Get PDF
    Since March 2020, the coronavirus disease, also known as COVID-19 has become a global pandemic. According to UNESCO, schools were closed in about 100 countries due to a public health emergency, including Indonesia. The condition forced teachers to make the transition from face-to-face learning to online learning. This study aims to determine the perceptions of EFL teachers about the practicality and usefulness of online learning at two junior high schools in Batang Hari regency, Jambi province. The researcher used a descriptive qualitative design and employed a semi-structured interview to collect the data. The subjects of this research are two English teachers at two Junior High Schools in Batang Hari regency. The findings showed that in terms of practicality, the teachers consider online learning was more practical, flexible, and effecient during online learning. In terms of usefulness, the teachers felt that the use of technology increased their knowledge of using technology, especially on an online platform

    Statistic Whitelisting for Enterprise Network Incident Response

    Get PDF
    This research seeks to satisfy the need for the rapid evaluation of enterprise network hosts in order to identify items of significance through the introduction of a statistic whitelist based on the behavior of the processes on each host. By taking advantage of the repetition of processes and the resources they access, a whitelist can be generated using large quantities of host machines. For each process, the Modules and the TCP & UDP Connections are compared to identify which resources are most commonly accessed by each process. Results show 47% of processes receiving a whitelist score of 75% or greater in the five hosts identified as having the worst overall scores and 60% of processes when the hosts more closely match the hosts used to build the whitelist

    Categorization of Security Design Patterns

    Get PDF
    Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework\u27s effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, Secure State Machine) to a production system for document management. Part 3 presents teaching modules to introduce patterns into lower-division computer science courses. Five modules, integer over ow, input validation, HTTPS, les access, and SQL injection, are proposed for conveying an aware of security patterns and their value in software development

    The effect of information technology, adherence to accounting rules, and human resources on the reliability of financial statements in Central Lombok District Government

    Get PDF
    This study aims to determine the effect of information technology, adherence to accounting rules, and human resources to the reliability of financial statements in Central Lombok District Government. This study uses a quantitative approach, with primary data obtained through questionnaires. The respondents are the employees of finance department of Cen-tral Lombok District Government. The independent variables used in this study are infor-mation technology, adherence to accounting rules, and human resources, while the depen-dent variable is the reliability of financial statements. The respondents are asked to answer a set of questions listed in a questionnaire. 72 samples are taken from the total population of 256, however only 63, which are considered valid to be analyzed. For the data analysis, it used double linear regression method and processed by using SPSS 18.0. The data analysis results based on t-test show that information technology and human resources have positive significant effect on the reliability of financial statements, but adherence to accounting rules has positive insignificant effect on the reliability of financial statements in Central Lombok District Government. The implication of this study leads to the importance of the optimized preparation of financial statements to achieve the reliable financial statements
    corecore