2,147 research outputs found

    A Novel Thread Scheduler Design for Polymorphic Embedded Systems

    Get PDF
    A novel thread scheduler design for polymorphic embedded systems Abstract: The ever-increasing complexity of current day embedded systems necessitates that these systems be adaptable and scalable to user demands. With the growing use of consumer electronic devices, embedded computing is steadily approaching the desktop computing trend. End users expect their consumer electronic devices to operate faster than before and offer support for a wide range of applications. In order to accommodate a broad range of user applications, the challenge is to come up with an efficient design for the embedded system scheduler. Hence the primary goal of the thesis is to design a thread scheduler for a polymorphic thread computing embedded system. This is the first ever novel attempt at designing a polymorphic thread scheduler as none of the existing or conventional schedulers have accounted for thread polymorphism. To summarize the thesis work, a dynamic thread scheduler for a Multiple Application, Multithreaded polymorphic system has been implemented with User satisfaction as its objective function. The sigmoid function helps to accurately model end user perception in an embedded system as opposed to the conventional systems where the objective is to maximize/minimize the performance metric such as performance, power, energy etc. The Polymorphic thread scheduler framework which operates in a dynamic environment with N multithreaded applications has been explained and evaluated. Randomly generated Application graphs are used to test the Polymorphic scheduler framework. The benefits obtained by using User Satisfaction as the objective function and the performance enhancements obtained using the novel thread scheduler are demonstrated clearly using the result graphs. The advantages of the proposed greedy thread scheduling algorithm are demonstrated by comparison against conventional thread scheduling approaches like First Come First Serve (FCFS) and priority scheduling schemes

    Discovering New Vulnerabilities in Computer Systems

    Get PDF
    Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing. to effectively protect computer systems from devastation, it is imperative to discover and mitigate vulnerabilities before they fall into the offensive parties\u27 hands. This dissertation is dedicated to the research and discovery of new design and deployment vulnerabilities in three very different types of computer systems.;The first vulnerability is found in the automatic malicious binary (malware) detection system. Binary analysis, a central piece of technology for malware detection, are divided into two classes, static analysis and dynamic analysis. State-of-the-art detection systems employ both classes of analyses to complement each other\u27s strengths and weaknesses for improved detection results. However, we found that the commonly seen design patterns may suffer from evasion attacks. We demonstrate attacks on the vulnerabilities by designing and implementing a novel binary obfuscation technique.;The second vulnerability is located in the design of server system power management. Technological advancements have improved server system power efficiency and facilitated energy proportional computing. However, the change of power profile makes the power consumption subjected to unaudited influences of remote parties, leaving the server systems vulnerable to energy-targeted malicious exploit. We demonstrate an energy abusing attack on a standalone open Web server, measure the extent of the damage, and present a preliminary defense strategy.;The third vulnerability is discovered in the application of server virtualization technologies. Server virtualization greatly benefits today\u27s data centers and brings pervasive cloud computing a step closer to the general public. However, the practice of physical co-hosting virtual machines with different security privileges risks introducing covert channels that seriously threaten the information security in the cloud. We study the construction of high-bandwidth covert channels via the memory sub-system, and show a practical exploit of cross-virtual-machine covert channels on virtualized x86 platforms

    Polymorphic computing abstraction for heterogeneous architectures

    Get PDF
    Integration of multiple computing paradigms onto system on chip (SoC) has pushed the boundaries of design space exploration for hardware architectures and computing system software stack. The heterogeneity of computing styles in SoC has created a new class of architectures referred to as Heterogeneous Architectures. Novel applications developed to exploit the different computing styles are user centric for embedded SoC. Software and hardware designers are faced with several challenges to harness the full potential of heterogeneous architectures. Applications have to execute on more than one compute style to increase overall SoC resource utilization. The implication of such an abstraction is that application threads need to be polymorphic. Operating system layer is thus faced with the problem of scheduling polymorphic threads. Resource allocation is also an important problem to be dealt by the OS. Morphism evolution of application threads is constrained by the availability of heterogeneous computing resources. Traditional design optimization goals such as computational power and lower energy per computation are inadequate to satisfy user centric application resource needs. Resource allocation decisions at application layer need to permeate to the architectural layer to avoid conflicting demands which may affect energy-delay characteristics of application threads. We propose Polymorphic computing abstraction as a unified computing model for heterogeneous architectures to address the above issues. Simulation environment for polymorphic applications is developed and evaluated under various scheduling strategies to determine the effectiveness of polymorphism abstraction on resource allocation. User satisfaction model is also developed to complement polymorphism and used for optimization of resource utilization at application and network layer of embedded systems

    Seasonal variation of serotonin turnover in human cerebrospinal fluid, depressive symptoms and the role of the 5-HTTLPR.

    Get PDF
    Studying monoaminergic seasonality is likely to improve our understanding of neurobiological mechanisms underlying season-associated physiological and pathophysiological behavior. Studies of monoaminergic seasonality and the influence of the serotonin-transporter-linked polymorphic region (5-HTTLPR) on serotonin seasonality have yielded conflicting results, possibly due to lack of power and absence of multi-year analyses. We aimed to assess the extent of seasonal monoamine turnover and examined the possible involvement of the 5-HTTLPR. To determine the influence of seasonality on monoamine turnover, 5-hydroxyindoleacetic acid (5-HIAA) and homovanillic acid (HVA) were measured in the cerebrospinal fluid of 479 human subjects collected during a 3-year period. Cosine and non-parametric seasonal modeling were applied to both metabolites. We computed serotonin (5-HT) seasonality values and performed an association analysis with the s/l alleles of the 5-HTTLPR. Depressive symptomatology was assessed using the Beck Depression Inventory-II. Circannual variation in 5-HIAA fitted a spring-peak cosine model that was significantly associated with sampling month (P=0.0074). Season of sampling explained 5.4% (P=1.57 × 10(-7)) of the variance in 5-HIAA concentrations. The 5-HTTLPR s-allele was associated with increased 5-HIAA seasonality (standardized regression coefficient=0.12, P=0.020, N=393). 5-HIAA seasonality correlated with depressive symptoms (Spearman's rho=0.13, P=0.018, N=345). In conclusion, we highlight a dose-dependent association of the 5-HTTLPR with 5-HIAA seasonality and a positive correlation between 5-HIAA seasonality and depressive symptomatology. The presented data set the stage for follow-up in clinical populations with a role for seasonality, such as affective disorders

    A Survey of Techniques for Improving Security of GPUs

    Full text link
    Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures

    A fast analysis for thread-local garbage collection with dynamic class loading

    Get PDF
    Long-running, heavily multi-threaded, Java server applications make stringent demands of garbage collector (GC) performance. Synchronisation of all application threads before garbage collection is a significant bottleneck for JVMs that use native threads. We present a new static analysis and a novel GC framework designed to address this issue by allowing independent collection of thread-local heaps. In contrast to previous work, our solution safely classifies objects even in the presence of dynamic class loading, requires neither write-barriers that may do unbounded work, nor synchronisation, nor locks during thread-local collections; our analysis is sufficiently fast to permit its integration into a high-performance, production-quality virtual machine

    The QT interval in lightning injury with implications for the cessation of metabolism hypothesis

    Get PDF
    An hypothesis is presented to provide an alternative to the Cessation of Metabolism hypothesis often invoked in lightning injury. Cessation of Metabolism has been proposed to explain the observation of good recovery after a prolonged period in cardiac arrest in some lightning injured patients. Reevaluation of EEGs from lightning injured patients show a high incidence of QT prolongation. Reexamination of the cases used to support Cessation of Metabolism also reveals little evidence to justify the hypothesis. The finding of QT prolongation coupled with the hyperadrenergic state said to exist in lightning injury, may promote a state of episodic induction of and recovery from Torsade de Pointes Ventricular Tachycardia (VT). Histological examination of the myocardium supports the new hypothesis. This the first concerted description of lightning injury as one of the general causes of QT prolongation. It appears to occur frequently after lightning injury, is a prerequisite of and predisposes to episodes of Torsade de Pointes VT. These electrocardiographic abnormalities explain Cessation of Metabolism and recognition may change management and lead to greater survival

    Coarse-Grained, Fine-Grained, and Lock-Free Concurrency Approaches for Self-Balancing B-Tree

    Full text link
    This dissertation examines the concurrency approaches for a standard, unmodified B-Tree which is one of the more complex data structures. This includes the coarse grained, fine-grained locking, and the lock-free approaches. The basic industry standard coarse-grained approach is used as a base-line for comparison to the more advanced fine-grained and lock-free approaches. The fine-grained approach is explored and algorithms are presented for the fine-grained B-Tree insertion and deletion. The lock-free approach is addressed and an algorithm for a lock-free B- Tree insertion is provided. The issues associated with a lock-free deletion are discussed. Comparison trade-offs are presented and discussed. As a final part of this effort, specific testing processes are discussed and presented
    • …
    corecore