Galich et al., 2021 - Google Patents
Investigation of the Impact of Vulnerability of x86 CPUs on the Performance of Software-Defined Networking ControllersGalich et al., 2021
- Document ID
- 8873277127407846809
- Author
- Galich S
- Pasyuk A
- Semenov E
- Publication year
- Publication venue
- " Smart Technologies" for Society, State and Economy 13
External Links
Snippet
Goal: This article describes the impact of vulnerability of x86 CPUs on the performance of OpenDaylight software-defined networking controllers. Methodology: The authors measured the latency and throughput of processing asynchronous messages. The calculations were …
- 238000009114 investigational therapy 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Linguaglossa et al. | Survey of performance acceleration techniques for network function virtualization | |
US10623418B2 (en) | Internet of Things security appliance | |
Le et al. | Cloud computing and virtualization | |
US10831889B2 (en) | Secure memory implementation for secure execution of virtual machines | |
US10387686B2 (en) | Hardware based isolation for secure execution of virtual machines | |
EP3830728A1 (en) | Remediation of flush reload attacks | |
WO2017112106A1 (en) | Service assurance and security of computing systems using fingerprinting | |
US11113388B2 (en) | Cloud forensics and incident response platform | |
Wu et al. | Identification and evaluation of sharing memory covert timing channel in Xen virtual machines | |
US11876815B2 (en) | Device anomaly detection | |
Saxena et al. | An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity | |
Segarra et al. | Using Trusted Execution Environments for Secure Stream Processing of Medical Data: (Case Study Paper) | |
Ahamed et al. | Security aware and energy-efficient virtual machine consolidation in cloud computing systems | |
Tunc et al. | Teaching and training cybersecurity as a cloud service | |
Acosta et al. | Lightweight on-demand honeypot deployment for cyber deception | |
Yao et al. | CryptVMI: A flexible and encrypted virtual machine introspection system in the cloud | |
US12107870B2 (en) | Protecting accelerators from malicious network functions | |
Galich et al. | Investigation of the Impact of Vulnerability of x86 CPUs on the Performance of Software-Defined Networking Controllers | |
Galata et al. | Research of the training ground for the protection of critical information resources by iRisk method | |
Sudusinghe et al. | Network-on-chip attack detection using machine learning | |
Liu et al. | A behavioral anomaly detection strategy based on time series process portraits for desktop virtualization systems | |
Kolhar | Web Server Performance Evaluation in a Virtualisation Environment | |
Göttel et al. | iperfTZ: Understanding network bottlenecks for TrustZone-based trusted applications | |
Buch et al. | Trinetra: a solution to handle cross-vm time-driven attack | |
Suksomboon et al. | Towards performance prediction of multicore software routers |