Interrupt Context

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 57 Experts worldwide ranked by ideXlab platform

Fengwei Zhang - One of the best experts on this subject based on the ideXlab platform.

  • Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
    IEEE Transactions on Information Forensics and Security, 2018
    Co-Authors: Xiaomeng Tong, Fengwei Zhang
    Abstract:

    The operating system kernel is often the security foundation for the whole system. To prevent attacks, control-flow integrity (CFI) has been proposed to ensure that any control transfer during the program’s execution never deviates from its control-flow graph (CFG). Existing CFI solutions either work in user space or are coarse-grained; thus they cannot be readily deployed in kernels or are vulnerable to state-of-the-art attacks. In this paper, we present Fine-CFI, a system that enforces fine-grained CFI for operating system kernels. Unlike previous systems, Fine-CFI constructs the kernel’s fine-grained CFG with a retrofitted Context-sensitive and field-sensitive pointer analysis, then enforces CFI with this CFG. At the same time, Fine-CFI provides comprehensive protection to the control data in the kernel’s Interrupt Context. Combining the above two kinds of protection, we can thus defeat those formidable ret2usr and kernel code-reuse attacks. We have developed a compiler-based prototype and implemented this technique in Linux 3.14 kernel. Our evaluation indicates that Fine-CFI prevents all the gadgets found by an open-source gadget-finding tool from being misused, as well as all the attacks from the RIPE benchmark and malicious attempts to modify control data in the Interrupt Context; and it also reduces the number of indirect control-flow targets by 99.998%, thus largely raising the bar for attackers. Our evaluation also shows that the performance overhead introduced by Fine-CFI is less than 10% on average.

Xiaomeng Tong - One of the best experts on this subject based on the ideXlab platform.

  • Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
    IEEE Transactions on Information Forensics and Security, 2018
    Co-Authors: Xiaomeng Tong, Fengwei Zhang
    Abstract:

    The operating system kernel is often the security foundation for the whole system. To prevent attacks, control-flow integrity (CFI) has been proposed to ensure that any control transfer during the program’s execution never deviates from its control-flow graph (CFG). Existing CFI solutions either work in user space or are coarse-grained; thus they cannot be readily deployed in kernels or are vulnerable to state-of-the-art attacks. In this paper, we present Fine-CFI, a system that enforces fine-grained CFI for operating system kernels. Unlike previous systems, Fine-CFI constructs the kernel’s fine-grained CFG with a retrofitted Context-sensitive and field-sensitive pointer analysis, then enforces CFI with this CFG. At the same time, Fine-CFI provides comprehensive protection to the control data in the kernel’s Interrupt Context. Combining the above two kinds of protection, we can thus defeat those formidable ret2usr and kernel code-reuse attacks. We have developed a compiler-based prototype and implemented this technique in Linux 3.14 kernel. Our evaluation indicates that Fine-CFI prevents all the gadgets found by an open-source gadget-finding tool from being misused, as well as all the attacks from the RIPE benchmark and malicious attempts to modify control data in the Interrupt Context; and it also reduces the number of indirect control-flow targets by 99.998%, thus largely raising the bar for attackers. Our evaluation also shows that the performance overhead introduced by Fine-CFI is less than 10% on average.

Yutaka Ishikawa - One of the best experts on this subject based on the ideXlab platform.

  • design of kernel level asynchronous collective communication
    EuroMPI'10 Proceedings of the 17th European MPI users' group meeting conference on Recent advances in the message passing interface, 2010
    Co-Authors: Akihiro Nomura, Yutaka Ishikawa
    Abstract:

    Overlapping computation and communication, not only point-to-point but also collective communications, is an important technique to improve the performance of parallel programs. Since the current non-blocking collective communications have been mostly implemented using an extra thread to progress communication, they have extra overhead due to thread scheduling and Context switching. In this paper, a new non- blocking communication facility, called KACC is proposed to provide fast asynchronous collective communications. KACC is implemented in the OS kernel Interrupt Context to perform non-blocking asynchronous collective operations without an extra thread. The experimental results show that the CPU time cost of this method is sufficiently small.

  • EuroMPI - Design of kernel-level asynchronous collective communication
    Recent Advances in the Message Passing Interface, 2010
    Co-Authors: Akihiro Nomura, Yutaka Ishikawa
    Abstract:

    Overlapping computation and communication, not only point-to-point but also collective communications, is an important technique to improve the performance of parallel programs. Since the current non-blocking collective communications have been mostly implemented using an extra thread to progress communication, they have extra overhead due to thread scheduling and Context switching. In this paper, a new non- blocking communication facility, called KACC is proposed to provide fast asynchronous collective communications. KACC is implemented in the OS kernel Interrupt Context to perform non-blocking asynchronous collective operations without an extra thread. The experimental results show that the CPU time cost of this method is sufficiently small.

Chaedeok Lim - One of the best experts on this subject based on the ideXlab platform.

  • SEUS - Experimental analysis on time-triggered power consumption measurement with DVS-enabled multiple power domain platform
    Software Technologies for Embedded and Ubiquitous Systems, 2007
    Co-Authors: Songah Chae, Doo-hyun Kim, Changhee Jung, Duk-kyun Woo, Chaedeok Lim
    Abstract:

    Recently, the battery and low-power H/W technologies for mobile and wearable computing devices have been advanced rapidly. But on the other hand the computation and communication demands of the embedded applications are increasing more rapidly. Therefore, the application developers are still required to develop their codes to utilize the available energy as efficient as possible. The provision of software power measurement with reasonable accuracy, consistency and low overhead is an indispensable factor for software power engineering. In this paper, we present a time-triggered mechanism for providing energy consumption profiles in the level of C functions. The similar mechanisms have already been introduced at the previous researches such as PowerScope and ePRO. Instead, we, in this paper, introduce our efforts to extend these researches to incorporate power domains and DVS (Dynamic Voltage Scaling), then interpret these mechanisms as the view of time-triggered approach for better understanding to the relationships among timer Interrupt, Context switching, DAQ triggering, multi-channel DAQ delay, and etc. From our experimental results, we could conclude that the timetriggered approach for the function level energy measurement properly worked with low overheads and produced consistent energy consumption profiles on the DVS-applied program codes running upon the platforms supporting multiple power domains.

Jian Kuang - One of the best experts on this subject based on the ideXlab platform.

  • PAAP - Interrupt Responsive Spinlock Mechanism Based on MCS for Multi-core RTOS
    Parallel Architectures Algorithms and Programming, 2020
    Co-Authors: Jingqiu Zheng, Jiali Bian, Jian Kuang
    Abstract:

    The kernel spinlock has a non-negligible influence on the real-time performance of the multi-core RTOS. In order to protect mutual exclusive kernel data accessed in both task Context and Interrupt Context by CPU-cores, the RTOS kernel uses existing FIFO spinlock algorithm as kernel spinlock must disable Interrupt before acquiring lock, which will increase the Interrupt response latency in the case of fierce competition for spinlock. In this work, the Interrupt Responsive Spinlock (IRS) mechanism based on MCS algorithm allows the CPU-cores to respond to Interrupt during spin waiting, disable Interrupt while holding spinlock, therefore the system can respond to Interrupts in time without damaging OS kernel critical section. Besides, MCS-IRS maintains the compatibility with MCS semantics so that is transparent to the caller. Experiments show that MCS-IRS can eliminate the impact of spinlock fierce contention on Worst-Case Interrupt Response Latency, and has better multi-core scalability than MCS on Worst-Case Interrupt Disable Time, which can improve the real-time performance of multi-core RTOS.