The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is a problem of Linux security arising as Linux system has come out as a core of electric automated system and played a role of important operating system of mobile communications. This paper describes security of Linux and requirements, analyzes well-known weakness of Linux, suggests solutions through existing security solution, and introduces an improved Linux kernel module. It also suggests...
Prompt updating against the latest security threats is important, and conveniently achieved by using patches (i.e., software updates) on both servers and PCs in a timely manner. To apply patches safely, however, their impact should be examined in advance. Administrators need to pinpoint all the software programs that are potentially influenced by a patch. Our patch impact analyzer monitors the program's...
Many security-critical web applications, such as online banking and e-commerce, require a secure communication path between the user and a remote server. Securing this endto- end path is challenging and can be broken down into several segments. The network part between the user's machine and the server is usually well protected, using secure communication protocols, such as the Transport Layer Security...
Operating Systems interact directly with the hardware, so they are prone to hardware errors. This is particularly true with monolithic kernels, where all subsystems and device drivers share the same execution domain. Even in systems that support kernel modules, components still run under the same privilege level as the main kernel. Module partitioning techniques to address error propagation do exist,...
Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to monitor and control the system calls. By using the LSM we can inspect the activity of unknown...
Current trends in data-intensive applications increase the demand for larger physical memory, resulting in the memory subsystem consuming a significant portion of system's energy. Furthermore, data-intensive applications heavily rely on a large buffer cache that occupies a majority of physical memory. Subsequently, we are focusing on the power management for physical memory dedicated to the buffer...
Distributed systems are designed to explore transparently computational resources of hosts connected by some communication technology. Transparency can be obtained through software designed specifically for this purpose. In this paper, the problems of the distribution of the processing of the system components is investigated with the objective of improve the load balancing to obtain the best performance...
Along with the development and application of the high speed network, in order to reduce the cost of data copy and context switch, the paper presents an improved method of zero-copy data transmission that is suitable for the high speed network environment on Linux and UNIX platforms. The method can reduce the number of data copy and context switch between kernel and user mode. It is tested by transmitting...
This paper presents a study on long latency failures using accelerated fault injection. The data collected from the experiments are used to analyze the significance, causes, and characteristics of long latency failures caused by soft errors in the processor and the memory. The results indicate that a non-negligible portion of soft errors in the code and data memory lead to long latency failures. The...
Problems remain the layered approach. Each layer possesses considerable functionality. Major changes in one layer can have numerous effects, many difficult to trace, on code in adjacent layers. In this paper, we have introduced the microkernel architecture, studied the benefits of a microkernel organization and performance, point out the microkernel must include those functions, that depend directly...
Fair-share scheduling attempts to grant access to a resource based on the amount of ??share?? that a task possesses. It is widely used in places such as Internet routing, and recently, in the Linux kernel. Software performance engineering is concerned with creating responsive applications and often uses modeling to predict the behaviour of a system before the system is built. This work extends the...
Existing operating system designs cannot guarantee isolation of user applications or system components from some system faults that occur in operating system services. If an error causes the failure by operating system services, the system can be corrupted or many system components which are dependent that services are affected. For constructing more reliable system, we have to manage this problem...
The paper will introduce a new operating system architecture microkernel for education. For its safe, small, and flexible feature, microkernel is becoming widely use in various aspects. Taking it to education, will from different design architecture to make learner get deeper understanding of operating system mechanisms. Fiasco is a real, second-generation microkernel whose source code is less than...
Virtualized environments are important building blocks in consolidated data centers and cloud computing. Full virtualization (FV) allows unmodified guest OSes to run on virtualization-aware microprocessors. However, the significant overhead of device emulation in FV has caused high I/O overhead. Current implementations based on paravirtualization can only reduce such overhead partially. This paper...
This paper describes an open source navigation system architecture for use in autonomous underwater vehicles. It is based on the mission oriented operating system proposed, published and programmed by ( (P. Newman, 2006), (P. Newman, 2008)). It is uniquely applicable for work-in-progress type and development-stage software and capability installation onto an AUV system. This applicability is achieved...
In this paper, online system-level self-healing support is presented for embedded systems. Different from off-line log analysis methods used by conventional intrusion detection systems, our research focuses on analyzing runtime kernel data structures hence perform self-diagnosis and self-healing. Inside the infrastructure, self-diagnosis and self-healing solutions have been implemented based on several...
With the increasingly widespread application of the network, a distributed operating system based on Linux cluster has been developing rapidly. This paper presents a kernel level distributed interprocess communication system model with support for distributed process synchronization and communication. This system model uses the System V interprocess communication programming interface and enhances...
The importance of the virtualization in embedded computing area is currently emerging. The virtualization can enhance system flexibility by enabling the concurrent execution of an application OS and a real-time OS (RTOS) on the same processor. L4 microkernel can be used as an efficient hypervisor which provides environment for operating systems virtualization. In order to run the application OSes...
Cluster-based servers delivering timely responsive service can shorten response latency and maximize system throughput through multi-threading. However, under high workload, large volume of threads may overload the kernel, leading to an inoperational system "hold-out" status. Majority of overload control work have been done at application level, but lack the collaboration between application...
Microkernels have been developed to minimize the size of software that needs to run in privileged CPU mode. It provides a minimal set of general hardware abstractions and able to implement an operating system with a high level of reliability and security. In L4 microkernel, the creation of address spaces, thread and inter process communication as fundamental abstraction is important in the development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.