3 research outputs found

    Execution Offloading ๊ธฐ์ˆ ์„ ์‚ฌ์šฉํ•œ ๋ชจ๋ฐ”์ผ ๊ธฐ๊ธฐ๋ฅผ ์œ„ํ•œ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์†”๋ฃจ์…˜

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2015. 8. ๋ฐฑ์œคํฅ.So far, security mechanisms for mobile devices have had difficulties to protect from malicious threats due to the limited resources of mobile devices. With the prevalence of cloud computing, one of promising solutions to overcome the difficulties is to exploit cloud environments, where a remote virtual machine performs the resource-consuming security analysis instead of a mobile device. However, existing cloud-based solutions are still insufficient because of the code coverage problem and security level degradation. Therefore, this thesis proposes a static and dynamic analysis based security solution called SORCloud. For dynamic analysis, it offloads a process of a suspicious application to a remote virtual machine for dynamic security analysis, by which SORCloud resolves two problems mentioned above. Through comprehensive experiments, we show how efficiently the proposed scheme works and detects malicious behaviorContents I. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 II. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 III. RelatedWork . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.1 Androgaurd . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2 Andriod-apktool . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 Dex2Jar . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.4 Dexter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.5 APKInspector . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.6 API monitor . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.7 offloading . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 IV. SorCloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4.1 System Overview . . . . . . . . . . . . . . . . . . . . . . . 16 4.2 System Modules . . . . . . . . . . . . . . . . . . . . . . . . 17 4.3 Execution offloading . . . . . . . . . . . . . . . . . . . . . 18 4.3.1 Code Instrumentation . . . . . . . . . . . . . . . . . 18 4.3.2 Thread Migration . . . . . . . . . . . . . . . . . . . 21 4.4 Security Modules . . . . . . . . . . . . . . . . . . . . . . . 23 4.5 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . 25 4.6 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4.6.1 Experimental setup . . . . . . . . . . . . . . . . . . 26 ii 4.6.2 Experimental results . . . . . . . . . . . . . . . . . 27 4.7 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . 34 4.8 FUTURE WORK . . . . . . . . . . . . . . . . . . . . . . . 35 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 ์ดˆ๋ก . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41Maste

    Automatic prediction of computational resource consumption for efficient task migration in cloud

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2015. 2. ๋ฐฑ์œคํฅ.In order to accommodate the high demand for performance in smartphones, mobile cloud computing techniques, which aim to enhance a smartphone's performance through utilizing powerful cloud servers, were suggested. Among such techniques, execution offloading, which migrates a thread between a mobile device and a server, is often employed. In such execution offloading techniques, it is typical to dynamically decide what code part is to be offloaded through decision making algorithms. In order to achieve optimal offloading performance, however, the gain and cost of offloading must be predicted accurately for such algorithms. Previous works did not try hard to do this because it is usually expensive to make an accurate prediction. Moreover, existing schemes completely ignore the costs of cloud resources by assuming that idle servers are always available for free of charge. These unrealistic assumptions make each server run only a small load to achieve the guaranteed high offload performance. Therefore, these schemes cannot be applied to real-world commercial clouds which aim to minimize the operation costs by maximizing the server throughput, and then charge users for their resource usage. Thus in this dissertation, I present Mantis, a framework for predicting the Computational Resource Consumption(CRC) of Android applications on given inputs accurately, and efficiently. CRC synergistically combines techniques from program analysis and machine learning. It constructs concise CRC models by choosing from many program execution features only a handful that are most correlated with the program's CRC metric yet can be evaluated efficiently from the program's input. I apply program slicing to reduce evaluation time of a feature and automatically generate executable code snippets for efficiently evaluating features. Using the techniques, I empirically show they enhance the performance of offloading. Lately, I propose CMcloud, a novel cost-effective mobile-to-cloud offloading platform, which works nicely under the real-world cloud environments. CMcloud minimizes both the server costs and the user service fee by offloading as many mobile applications to a single server as possible, while satisfying the target performance of all applications.Abstract i Chapter 1 Introduction 1 1.1 Mobile Execution Offloading . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Dynamic Code Partitioning . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Cost-effectivity of Mobile Execution Offloading . . . . . . . . . . . . 3 1.4 Dissertation Contributions and Outline . . . . . . . . . . . . . . . . . 4 Chapter 2 Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices 6 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.3 Feature Instrumentation . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.4 CRC Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.5 Predictor Code Generation . . . . . . . . . . . . . . . . . . . . . . . 15 2.5.1 Rationale . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.5.2 Slicer Challenges . . . . . . . . . . . . . . . . . . . . . . . . 17 2.5.3 Slicer Design . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.6 Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.7 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 2.7.1 Evaluation Environment . . . . . . . . . . . . . . . . . . . . 24 2.7.2 Experiment Results . . . . . . . . . . . . . . . . . . . . . . . 26 2.8 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 2.9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Chapter 3 Precise Execution Offloading for Applications with Dynamic Behavior in Mobile Cloud Computing 40 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.2 Background & Motivation . . . . . . . . . . . . . . . . . . . . . . . 41 3.2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 3.2.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3.3 f Mantis : Automatically generation of accurate and efficient performance predictor for mobile execution offloading . . . . . . . . . . . . 48 3.3.1 Performance predictor generation overview . . . . . . . . . . 49 3.3.2 Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3.3.3 Predictor Generator . . . . . . . . . . . . . . . . . . . . . . 50 3.4 Dynamic code partitioning with predictor generated by f Mantis . . . 52 3.4.1 Architecture for our solver . . . . . . . . . . . . . . . . . . . 52 3.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 3.5.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . 54 3.5.2 Evaluation Environment . . . . . . . . . . . . . . . . . . . . 55 3.5.3 Experimental results . . . . . . . . . . . . . . . . . . . . . . 56 3.6 Related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Chapter 4 CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications 73 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 4.2 Backgrounds and Limitations . . . . . . . . . . . . . . . . . . . . . . 75 4.2.1 Basic Offload Mechanisms . . . . . . . . . . . . . . . . . . . 76 4.2.2 Limitations of Existing schemes . . . . . . . . . . . . . . . . 77 4.3 CMcloud offloading . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 4.3.1 Design Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 79 4.3.2 Operation Model . . . . . . . . . . . . . . . . . . . . . . . . 80 4.3.3 Architecture Model . . . . . . . . . . . . . . . . . . . . . . . 82 4.4 CMcloud mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . 84 4.4.1 Reference-model Server Profiling . . . . . . . . . . . . . . . 84 4.4.2 Performance Estimation . . . . . . . . . . . . . . . . . . . . 85 4.4.3 Performance Monitoring . . . . . . . . . . . . . . . . . . . . 92 4.4.4 Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 4.4.5 Cost-aware Application Scheduling in Cloud . . . . . . . . . 94 4.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 4.5.1 Estimating Target CPI stack . . . . . . . . . . . . . . . . . . 96 4.5.2 Predicting Instruction Count . . . . . . . . . . . . . . . . . . 98 4.5.3 Cost Effectiveness with QoS requirements . . . . . . . . . . . 98 4.5.4 Offloading/migration Overhead . . . . . . . . . . . . . . . . 102 4.6 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 4.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Chapter 5 Conculsion 105 ์ดˆ๋ก 119 vDocto
    corecore