Matching micro-kernels to modern applications using fine-grained memory protection
نویسندگان
چکیده
Scalable distributed systems, systems which suffer no degradation as the number of computing nodes becomes larger, require a programming methodology where an application developer may take existing software modules and plug them together to form a new application. To allow mistrusting modules to interact, the underlying kernel support must offer protection barriers which do not impede performance. The wide-ranging nature of modern applications used on larger scale systems means that existing kernel functions may not necessarily be the most efficient for an application. The kernel must therefore allow an application to dynamically install a function in the kernel; this is one aspect of customization. This paper argues that customization support is one aspect of fine-grained protection for modules needing CPU supervisor privilege. We describe the kernel support required for fine grained protection. Basically, our approach relies on the assignment of a single address space to an application with application modules having their own domain of protection. An experiment was made by modifying the Mach kernel; results show that inter-domain communication by protected procedure call is up to 5 times faster than Mach 3.0 IPC.
منابع مشابه
Matching Micro - Kernels to Modern Applicationsusing Fine - Grained Memory
Scalable distributed systems, systems which suuer no degradation as the number of computing nodes becomes larger, require a programming methodology where an application developer may take existing software modules and plug them together to form a new application. To allow mistrusting modules to interact , the underlying kernel support must ooer protection barriers which do not impede performanc...
متن کاملHandling Memory Corruption Faults In Sensor Networks
Typical sensor nodes use resource constrained micro-controllers where user level applications, operating system components, device drivers, etc., reside within a single address space with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. To protect against such errors, we propose a ...
متن کاملSILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
Untrusted kernel extensions remain one of the major threats to the security of commodity OS kernels. Current containment approaches still have limitations in terms of security, granularity and flexibility, primarily due to the absence of secure resource management and communication methods. This paper presents SILVER, a framework that offers transparent protection domain primitives to achieve f...
متن کاملHow to Emulate Fine-grained Multithreading
Fine-grained multithreading can be used to hide longlatency operations encountered in parallel computers during remote memory access. Instead of using special processor hardware, the emulation of fine-grained multithreading on standard processor hardware is investigated. While emulation of coarse-grained multithreading is common in modern operating systems, in the fine-grained case research on ...
متن کاملCherub: Fine-grained application protection with on-demand virtualization
Cherub is an on-demand virtualization mechanism aiming to provide fine-grained application protection in untrusted environments. By leveraging late launch technology, Cherub dynamically inserts a lightweight virtual machine monitor (VMM) under a commodity operating system (OS) when critical pieces of an application code or data are to be processed. The novel design of Cherubwith a double-shadow...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995