62 research outputs found

    Virtualizing Graphics Architecture of Android Mobile Platforms in KVM/ARM Environment

    Get PDF
    With the availability of virtualization extension in mobile processors, e.g. ARM Cortex A-15, multiple virtual execution domains are efficiently supported in a mobile platform. Each execution domain requires high-performance graphics services for full-featured user interfaces such as smooth scrolling, background image blurring, and 3D images. However, graphics service is hard to be virtualized because multiple service components (e.g. ION and Fence) are involved. Moreover, the complexity of Graphical Processing Unit (GPU) device driver also makes harder virtualizing graphics service. In this paper, we propose a technique to virtualize the graphics architecture of Android mobile platform in KVM/ARM environment. The Android graphics architecture relies on underlying Linux kernel services such as the frame buffer memory allocator ION, the buffer synchronization service Fence, GPU device driver, and the display synchronization service VSync. These kernel services are provided as device files in Linux kernel. Our approach is to para-virtualize these device files based on a split device driver model. A major challenge is to translate guest-view of information into host-view of information, e.g. memory address translation, file descriptor management, and GPU Memory Management Unit (MMU) manipulation. The experimental results show that the proposed graphics virtualization technique achieved almost 84%-100% performance of native applications.11Ysciescopu

    Position-Independent Code Reuse:On the Effectiveness of ASLR in the Absence of Information Disclosure

    Get PDF
    Address-space layout randomization is a wellestablished defense against code-reuse attacks. However, it can be completely bypassed by just-in-time code-reuse attacks that rely on information disclosure of code addresses via memory or side-channel exposure. To address this fundamental weakness, much recent research has focused on detecting and mitigating information disclosure. The assumption being that if we perfect such techniques, we will not only maintain layout secrecy but also stop code reuse. In this paper, we demonstrate that an advanced attacker can mount practical code-reuse attacks even in the complete absence of information disclosure. To this end, we present Position-Independent Code-Reuse Attacks, a new class of codereuse attacks relying on the relative rather than absolute location of code gadgets in memory. By means of memory massaging, the attacker first makes the victim program generate a rudimentary ROP payload (for instance, containing code pointers that target instructions 'close' to relevant gadgets). Afterwards, the addresses in this payload are patched with small offsets via relative memory writes. To establish the practicality of such attacks, we present multiple Position-Independent ROP exploits against real-world software. After showing that we can bypass ASLR in current systems without requiring information disclosures, we evaluate the impact of our technique on other defenses, such as fine-grained ASLR, multi-variant execution, execute-only memory and re-randomization. We conclude by discussing potential mitigations

    INTELLECTUAL PROPERTY AND PATENT PROSPECTING AS A BASIS FOR KNOWLEDGE AND INNOVATION – A STUDY ON MOBILE INFORMATION TECHNOLOGIES AND VIRTUAL PROCESSES OF COMMUNICATION AND MANAGEMENT

    Get PDF
    Information and knowledge are essential drivers of innovations, technological development, and transformations that foster organizations’ competitiveness and constantly change the way people communicate, interact, and work. To hold information and knowledge means the possibility of expanding capacities and ensuring access to opportunities that may bring competitive advantage and economic growth. Considering these assumptions, the purpose of this study was to demonstrate how inventive actions can be collected and correlated as a source of information and knowledge for a given subject. In order to do so, we established as research elements the following topics: mobile information technologies, mobile communication, and management, and we looked for them, in a correlated way, in patent databases. This is a descriptive qualitative study, with secondary data collection in patent bases such as the websites Espacenet.com, Wipo.com and Patent2Net, which provide information on patents’ registrations. We used the Gephi software for analysis and visualization of network structures. Through the use of specific filters,  considering the three topics together, the results showed 213 patents filed in the period 1988–2015, and a concentration of records between 2012 and 2013, when 32% of them were registered. In addition, China was responsible for 40% of patent applications, followed by South Korea, with 24%, and the United States and Japan, both with nearly 11% of the total

    Folklore and the Internet: Vernacular Expression in a Digital World

    Get PDF
    Folklore and the Internet is a pioneering examination of the folkloric qualities of the World Wide Web, e-mail, and related digital media. It shows that folk culture, sustained by a new and evolving vernacular, has been a key, since the Internetýs beginnings, to language, practice, and interaction online. Users of many sorts continue to develop the Internet as a significant medium for generating, transmitting, documenting, and preserving folklore. In a set of new, insightful essays, contributors Trevor J. Blank, Simon J. Bronner, Robert Dobler, Russell Frank, Gregory Hansen, Robert Glenn Howard, Lynne S. McNeill, Elizabeth Tucker, and William Westerman showcase ways the Internet both shapes and is shaped by folklore.https://digitalcommons.usu.edu/usupress_pubs/1034/thumbnail.jp

    Demand-driven data acquisition for large scale fleets

    Get PDF
    Automakers manage vast fleets of connected vehicles and face an ever-increasing demand for their sensor readings. This demand originates from many stakeholders, each potentially requiring different sensors from different vehicles. Currently, this demand remains largely unfulfilled due to a lack of systems that can handle such diverse demands efficiently. Vehicles are usually passive participants in data acquisition, each continuously reading and transmitting the same static set of sensors. However, in a multi-tenant setup with diverse data demands, each vehicle potentially needs to provide different data instead. We present a system that performs such vehicle-specific minimization of data acquisition by mapping individual data demands to individual vehicles. We collect personal data only after prior consent and fulfill the requirements of the GDPR. Non-personal data can be collected by directly addressing individual vehicles. The system consists of a software component natively integrated with a major automaker’s vehicle platform and a cloud platform brokering access to acquired data. Sensor readings are either provided via near real-time streaming or as recorded trip files that provide specific consistency guarantees. A performance evaluation with over 200,000 simulated vehicles has shown that our system can increase server capacity on-demand and process streaming data within 269 ms on average during peak load. The resulting architecture can be used by other automakers or operators of large sensor networks. Native vehicle integration is not mandatory; the architecture can also be used with retrofitted hardware such as OBD readers. © 2021 by the authors. Licensee MDPI, Basel, Switzerland

    Shaping bacterial population behavior through computer-interfaced control of individual cells

    Get PDF
    This is the final version. Available from Springer Nature via the DOI in this record.Strains and data are available from the authors upon request. Custom scripts for the described setup are available as Supplementary Software.Bacteria in groups vary individually, and interact with other bacteria and the environment to produce population-level patterns of gene expression. Investigating such behavior in detail requires measuring and controlling populations at the single-cell level alongside precisely specified interactions and environmental characteristics. Here we present an automated, programmable platform that combines image-based gene expression and growth measurements with on-line optogenetic expression control for hundreds of individual Escherichia coli cells over days, in a dynamically adjustable environment. This integrated platform broadly enables experiments that bridge individual and population behaviors. We demonstrate: (i) population structuring by independent closed-loop control of gene expression in many individual cells, (ii) cell-cell variation control during antibiotic perturbation, (iii) hybrid bio-digital circuits in single cells, and freely specifiable digital communication between individual bacteria. These examples showcase the potential for real-time integration of theoretical models with measurement and control of many individual cells to investigate and engineer microbial population behavior.European Union's Seventh Frame ProgrammeAustrian Science FundAgence Nationale de la RechercheAgence Nationale de la RechercheAgence Nationale de la Recherch

    Software defined wireless network (sdwn) for industrial environment: case of underground mine

    Get PDF
    Avec le développement continu des industries minières canadiennes, l’établissement des réseaux de communications souterrains avancés et sans fil est devenu un élément essentiel du processus industriel minier et ceci pour améliorer la productivité et assurer la communication entre les mineurs. Cette étude vise à proposer un système de communication minier en procurant une architecture SDWN (Software Defined Wireless Network) basée sur la technologie de communication LTE. Dans cette étude, les plateformes les plus importantes de réseau mobile 4G ont été étudiées, configurées et testées dans deux zones différentes : un tunnel de mine souterrain et un couloir intérieur étroit. Également, une architecture mobile combinant SDWN et NFV (Network Functions Virtualization) a été réalisée
    corecore