Polymorphism and consistency: Complex network based on execution trace of system calls in Linux kernels

2020 ◽  
Vol 31 (09) ◽  
pp. 2050126
Author(s):  
Lihong Han ◽  
Qingguo Zhou ◽  
Juheng Zhang ◽  
Xuhui Yang ◽  
Rui Zhou ◽  
...  

Linux operating system (LOS) represents one of the most complex human-made systems, and it acts as an important function between software and hardware. In recent years, a large number of related works treat Linux operating system as a complex network and explore some of the unique characteristics of the network. However, there is little research on the execution process of LOS in terms of networks. In this paper, the run-time behaviors of execution process are traced by system calls of LOS kernel, and the run-time behaviors networks (RTBNs) are constructed, in which the nodes of RTBN represent the functions, and the edges of RTBN represent the function call relations. On this basis, the statistical characteristics of the RTBNs are investigated, and some features of the RTBNs are revealed. The result shows that some of the network characteristics remain relatively stable without obvious changes, showing the characteristics of consistency. However, some of the network characteristics tend to be random and uncertain, showing the feature of polymorphism.

2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Shufan Fei ◽  
Zheng Yan ◽  
Wenxiu Ding ◽  
Haomeng Xie

Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.


2013 ◽  
Vol 347-350 ◽  
pp. 1799-1803
Author(s):  
Bo Qu ◽  
Zhao Zhi Wu

This paper describes the design and implementation of an ARM based embedded operating system micro kernel developed on Linux platform with GNU tool chain in technical details, including the three-layer architecture of the kernel (boot layer, core layer and task layer), multi-task schedule (priority for real-time and round-robin for time-sharing), IRQ handler, SWI handler, system calls, and inter-task communication based on which the micro-kernel architecture is constructed. On the foundation of this micro kernel, more components essential to a practical operating system, such as file system and TCP/IP processing, can be added in order to form a real and practical multi-task micro-kernel embedded operating system.


2021 ◽  
Vol 24 (2) ◽  
pp. 24001
Author(s):  
V. Palchykov ◽  
M. Krasnytska ◽  
O. Mryglod ◽  
Yu. Holovatch

We suggest an underlying mechanism that governs the growth of a network of concepts, a complex network that reflects the connections between different scientific concepts based on their co-occurrences in publications. To this end, we perform empirical analysis of a network of concepts based on the preprints in physics submitted to the arXiv.org. We calculate the network characteristics and show that they cannot follow as a result of several simple commonly used network growth models. In turn, we suggest that a simultaneous account of two factors, i.e., growth by blocks and preferential selection, gives an explanation of empirically observed properties of the concepts network. Moreover, the observed structure emerges as a synergistic effect of these both factors: each of them alone does not lead to a satisfactory picture.


Author(s):  
Seog-Chan Oh ◽  
Dongwon Lee

In recent years, while many research proposals have been made toward novel algorithmic solutions of a myriad of web services composition problems, their validation has been less than satisfactory. One of the reasons for this problem is the lack of real benchmark web services data with which researchers can test and verify their proposals. In this chapter, to remedy this challenge, we present a novel benchmark toolkit, WSBen, which is capable of generating synthetic web services data with diverse scenarios and configurations using complex network theory. Web services researchers therefore can evaluate their web services discovery and composition algorithms in a more systematic fashion. The development of WSBen is inspired by our preliminary study on real-world web services crawled from the Web. The proposed WSBen can: (1) generate a collection of synthetic web services files in the WSDL format conforming to diverse complex network characteristics; (2) generate queries and ground truth sets for testing discovery and composition algorithms; (3) prepare auxiliary files to help further statistical analysis; (4) convert WSDL test sets to the formats that conventional AI planners can read; and (5) provide a graphical interface to control all these functions. To illustrate the application of the WSBen, in addition, we present case studies selected from three domains: (1) web services composition; (2) AI planning; and (3) the laws of networks in Physics community. The WSBen toolkit is available at: http://pike.psu.edu/sw/wsben/. This chapter is an invited extension of authors’ previous publication (Oh & Lee, 2009).


Sign in / Sign up

Export Citation Format

Share Document