Search results for "Operating system"

showing 4 items of 134 documents

Page replacement in operating system memory management

2007

operating systemskäyttöjärjestelmätsivunkorvauspage replacementalgoritmitmuistinhallintamemory managementalgorithms
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Detecting Kernel Vulnerabilities During the Development Phase

2015

Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…

procfssysfsbusiness.industryComputer scienceLinux kernelKernel virtual address spacecomputer.software_genreKernel (statistics)User spaceOperating systemHybrid kernelSoftware engineeringbusinesscomputerSecure coding2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
researchProduct

Scheduling under the network of temporo-spatial proximity relationships

2017

We discuss and introduce to the schedulingeld a novel, qualitative optimization model - scheduling under the network of temporo-spatial proximity relationships.We introduce a half perimeter proximity measure as an objective of scheduling.We present and evaluate an incremental Sequence Pair neighborhood evaluation algorithm, applicable to both scheduling and rectangle packing problems in VLSI industry. In this paper, we discuss and introduce to the scheduling field a novel optimization objective - half perimeter proximity measure in scheduling under the network of temporo-spatial proximity relationships. The presented approach enables to qualitatively express various reasons of scheduling ce…

proximity relationshipsMathematical optimizationGeneral Computer Sciencerectangle packing problemEvaluation algorithm0102 computer and information sciences02 engineering and technologyIntegrated circuitManagement Science and Operations Research01 natural scienceslaw.inventionScheduling (computing)lawApproximation error0202 electrical engineering electronic engineering information engineeringschedulingComputer Science::Operating SystemsMathematicsVery-large-scale integrationProximity measureneighborhood evaluation010201 computation theory & mathematicsModeling and Simulation020201 artificial intelligence & image processingsequence pairRectangle packingComputers & Operations Research
researchProduct