Memory Protection Scheme: Nooks Architecture vs. Mondrian Protection Scheme
نویسنده
چکیده
1.0 Abstract In recent times, there is a big explosion of embedded devices like PDAs and digital cameras in the consumer market arena. In order to incorporate these new devices into the computer systems a large number of device drivers have been written by different vendors. One way to define device drivers is to view them as an extension to the operating system kernel. Today the preferred way to add features to the operating system kernel is extending the kernel by loading unsafe object code and linking it directly to the kernel. In a recent study of FreeBSD operating system, new device drivers account for 38% of the growth [4]. According to recent studies the largest problem for OS reliability are the device drivers. According to a study at Stanford University, Linux drivers have 3 to 7 times as many bugs as the rest of the kernel [1]. The purpose of this research is to compare and contrast two new techniques named as Nook’s Architecture and Mondrian Memory Protection system and assess their strengths and weakness in solving the device driver problem
منابع مشابه
Extending Mondrian Memory Protection
Most modern operating systems implement some sort of memory protection scheme for user processes. These schemes make it is possible to set access permissions that determine whether a region of memory allocated for a process can be read, written, or executed by this process. Mondrian memory protection is a technique that extends the traditional memory protection scheme and allows fine-grain perm...
متن کاملProtection Scheme of Power Transformer Based on Time–Frequency Analysis and KSIR-SSVM
The aim of this paper is to extend a hybrid protection plan for Power Transformer (PT) based on MRA-KSIR-SSVM. This paper offers a new scheme for protection of power transformers to distinguish internal faults from inrush currents. Some significant characteristics of differential currents in the real PT operating circumstances are extracted. In this paper, Multi Resolution Analysis (MRA) is use...
متن کاملAn Online Free Penetration Multi-Stage Fuse Saving Protection Scheme in Distribution Systems with Photovoltaic Sources
In this paper, a multi-stage protective scheme is proposed to maintain the fuse and reclosers coordination. The proposed method operates online and proportional to the photovoltaic sources penetration rate. In the first step, a non-standard Current - Time - Voltage curve is used for fuse saving. If the new calculated TDS from the first stage is not implementable to the reclosers, the second sta...
متن کاملA local measurement-based protection scheme for DER integrated DC microgrid using Bagging Tree
In recent years, DC microgrid has attracted considerable attention of the research community because of the wide usage of DC power-based appliances. However, the acceptance of DC microgrid by power utilities is still limited due to the issues associated with the development of a reliable protection scheme. The high magnitude of DC fault current, its rapid rate of rising and absence of zero cros...
متن کاملArchitecture Support for High Speed Protection of Memory Integrity and Confidentiality in Symmetric Multiprocessor Systems
Recently there is a growing interest in both the architecture and the security community to create a hardware based solution for authenticating system memory. As shown in the previous work, such silicon based memory authentication could become a vital component for creating future trusted computing environments and digital rights protection. Almost all the published work have focused on authent...
متن کامل