125 research outputs found

    CARVE: Practical Security-Focused Software Debloating Using Simple Feature Set Mappings

    Full text link
    Software debloating is an emerging field of study aimed at improving the security and performance of software by removing excess library code and features that are not needed by the end user (called bloat). Software bloat is pervasive, and several debloating techniques have been proposed to address this problem. While these techniques are effective at reducing bloat, they are not practical for the average user, risk creating unsound programs and introducing vulnerabilities, and are not well suited for debloating complex software such as network protocol implementations. In this paper, we propose CARVE, a simple yet effective security-focused debloating technique that overcomes these limitations. CARVE employs static source code annotation to map software features source code, eliminating the need for advanced software analysis during debloating and reducing the overall level of technical sophistication required by the user. CARVE surpasses existing techniques by introducing debloating with replacement, a technique capable of preserving software interoperability and mitigating the risk of creating an unsound program or introducing a vulnerability. We evaluate CARVE in 12 debloating scenarios and demonstrate security and performance improvements that meet or exceed those of existing techniques.Comment: 8 pages, 4 figures, 2 tables, 1 appendi

    Effective Cache Apportioning for Performance Isolation Under Compiler Guidance

    Full text link
    With a growing number of cores in modern high-performance servers, effective sharing of the last level cache (LLC) is more critical than ever. The primary agenda of such systems is to maximize performance by efficiently supporting multi-tenancy of diverse workloads. However, this could be particularly challenging to achieve in practice, because modern workloads exhibit dynamic phase behaviour, which causes their cache requirements & sensitivities to vary at finer granularities during execution. Unfortunately, existing systems are oblivious to the application phase behavior, and are unable to detect and react quickly enough to these rapidly changing cache requirements, often incurring significant performance degradation. In this paper, we propose Com-CAS, a new apportioning system that provides dynamic cache allocations for co-executing applications. Com-CAS differs from the existing cache partitioning systems by adapting to the dynamic cache requirements of applications just-in-time, as opposed to reacting, without any hardware modifications. The front-end of Com-CAS consists of compiler-analysis equipped with machine learning mechanisms to predict cache requirements, while the back-end consists of proactive scheduler that dynamically apportions LLC amongst co-executing applications leveraging Intel Cache Allocation Technology (CAT). Com-CAS's partitioning scheme utilizes the compiler-generated information across finer granularities to predict the rapidly changing dynamic application behaviors, while simultaneously maintaining data locality. Our experiments show that Com-CAS improves average weighted throughput by 15% over unpartitioned cache system, and outperforms state-of-the-art partitioning system KPart by 20%, while maintaining the worst individual application completion time degradation to meet various Service-Level Agreement (SLA) requirements

    Combined Static Analysis and Machine Learning Prediction for Application Debloating

    Full text link
    Software debloating can effectively thwart certain code reuse attacks by reducing attack surfaces to break gadget chains. Approaches based on static analysis enable a reduced set of functions reachable at a callsite for execution by leveraging static properties of the callgraph. This achieves low runtime overhead, but the function set is conservatively computed, negatively affecting reduction. In contrast, approaches based on machine learning (ML) have much better precision and can sharply reduce function sets, leading to significant improvement in attack surface. Nevertheless, mispredictions occur in ML-based approaches. These cause overheads, and worse, there is no clear way to distinguish between mispredictions and actual attacks. In this work, we contend that a software debloating approach that incorporates ML-based predictions at runtime is realistic in a whole application setting, and that it can achieve significant attack surface reductions beyond the state of the art. We develop a framework, Predictive Debloat with Static Guarantees (PDSG). PDSG is fully sound and works on application source code. At runtime it predicts the dynamic callee set emanating from a callsite, and to resolve mispredictions, it employs a lightweight audit based on static invariants of call chains. We deduce the invariants offline and assert that they hold at runtime when there is a misprediction. To the best of our knowledge, it achieves the highest gadget reductions among similar techniques on SPEC CPU 2017, reducing 82.5% of the total gadgets on average. It triggers misprediction checks on only 3.8% of the total predictions invoked at runtime, and it leverages Datalog to verify dynamic call sequences conform to the static call relations. It has an overhead of 8.9%, which makes the scheme attractive for practical deployments

    Role of hysterolaparoscopy for the evaluation of primary infertility: An experience from a tertiary care hospital

    Get PDF
    Background: Infertility is one of the most common problem for which couple seeks medical attention. The main objective of the study was to assess the role of diagnostic hysterolaparoscopy in the diagnosis and treatment of primary infertility patients.Methods: For this retrospective study, patient with the diagnosis of primary infertility were recruited. Patients admitted between the periods 2014 to 2016 were included. Pertinent data related to infertility were collected from the case records and entered in predesigned performa.Results: Patients with primary infertility 246 (82%) diagnosed to have pelvic pathology. The most common cause of infertility was ovarian 122 (36.63%), Uterine 66 (19.82%), tubal 84 (25.22%) and unexplained infertility in 103 (30.93%) women. Patients with PCOS 76 (22.82%) and endometriosis 46 (13.81%) treated with drilling and endometriotic cystectomy. In 32 (9.60%) of patients hysteroscopic cannulation was done. For distal tubal blockage fimbrioplasty was performed in 38 (11.41%) of women. Pelvic adhesions diagnosed in 26 (7.80%) women. patients diagnosed with uterine septum 42 (12.61%) required hysteroscopic septal resection. During the evaluation of infertility 70 (21%) of women diagnosed to have incidental pelvic pathology treated according to pathology.Conclusions: Hysterolaparoscopy is emerging as a valuable technique for complete assessment of female infertility and also helps in treatment according to the cause

    A prospective observational study for the evaluation of maternal and fetal outcome in patient with eclampsia

    Get PDF
    Background: Eclampsia continues to be a measure health issue in developing country. In order to get a comprehensive data on eclamptic patients we conduct a prospective observational study to address the maternal and fetal complication during pregnancy.Methods: It is a prospective observational study conducted in a tertiary care medical college between the periods September 2016 to February 2017. During the period all patients with eclampsia admitted to the labour room were taken. Any patients with known epilepsy were excluded from the study.Results: During the period 3780 women were admitted to the labour room, out of which 56 women had eclampsia with an incidence of 1.48%. Out this antenatal eclampsia was most common with an incidence of 91.08% followed by intra partum 4 (7.14%) and postpartum eclampsia 1 (1.78%). Majority of patients 54 (96.43%) were unbooked or inadequately supervised. Most of the patient had normalization of blood pressure after oral nifedipine 46 (82.14%), only 10 (17.86%) patient required additional injection labetalol for control of blood pressure. The maternal complications were placental abruption 8 (14.28%), HELLP 6 (10.71%), pulmonary edema 1 (1.78%), acute renal failure 1 (1.78%), DIC 1 (1.78%) and maternal death 2 (3.57%). Out of fifty six babies delivered 42 (75%) had live birth and 14 (25%) had still birth. A total of 17 (40.42%) had IUGR, 17 (40.47%) require SNCU admission post-delivery.Conclusions:Eclampsia still remains the major cause of maternal and fetal morbidity. In low resource countries improvement in health care facility, adequate antenatal supervision, and timely referral will reduce the maternal and fetal complication.

    Wprowadzenie cewnika techniką retrograde i zamknięcie przetrwałego przewodu tętniczego techniką antegrade za pomocą urządzenia Coccoon Duct Occluder u 6-miesięcznego dziecka

    Get PDF
    Patent ductus arteriosus (PDA) accounts for up to 10% of all congenital heart disease. Transcatheter closure of PDAs has now become treatment of choice replacing surgery. It is simple, consisting of placement of device or vascular occlusion coils either antegrade from femoral vein or retrograde from femoral artery. Here we report a patient of PDA with vascular anatomy too difficult to be antegradely approached and were closed by a retrograde wiring and antegrade snaring using a customised snare. Then device was deployed by usual antegrade approach over snared wire. This retrograde wire-assisted technique and antegrade snaring could be utilized to overcome PDA of difficult vascular anatomy, which could not be easily fulfilled by conventional antegrade venous approach alone.Przetrwały przewód tętniczy (PDA) stanowi nawet 10% wszystkich wrodzonych wad serca. Przezcewnikowe zamknięciePDA jest obecnie metodą z wyboru, która zastąpiła leczenie chirurgiczne. Zabieg przezcewnikowy jest prosty do przeprowadzenia i polega na umieszczeniu w przewodzie tętniczym specjalnych implantów lub sprężynek wprowadzanychz dostępu przez żyłę udową (technika zstępująca, antegrade) lub przez tętnicę udową (technika wsteczna, retrograde).W niniejszej pracy opisano przypadek pacjenta z PDA, u którego budowa anatomiczna naczyń uniemożliwiała zastosowanie techniki zstępującej, dlatego zabieg wykonano, wsuwając prowadnik przez tętnicę udową (retrograde) i wprowadzając przez żyłę udową (antegrade) pętlę wykonaną specjalnie na potrzeby zabiegu przez operatorów. Następnieimplantowane urządzenie umieszczono na miejscu standardową techniką zstępującą (antegrade), wsuwając je poprowadniku za pomocą pętli. Tę technikę z użyciem prowadnika i pętli można wykorzystać do zamykania PDA u chorychz trudnymi warunkami anatomicznymi uniemożliwiającymi wykonanie zabiegu konwencjonalną metodą — wyłączniez dostępu przez żyłę udową
    corecore