Gradual Software-Based Memory Protection

نویسندگان

  • Michael Stilkerich
  • Daniel Lohmann
  • Wolfgang Schröder-Preikschat
چکیده

Software-based memory protection (MP) provides not only spatial isolation of different applications, but also additional means to detect programming errors within an application. However, this luxury comes at the cost of extra runtime checks that add overhead to the application. In this paper, we present the idea of gradual software-based MP, where we only add a subset of runtime checks to a program to gain configurability with respect to the tradeoff between dependability and cost. To support the selection, we analyze the importance of different classes of safety checks and research which types of checks could be implemented at no cost by a hardware protection unit. After examining the relative frequency of different runtime checks in a large Java class library, we expect these ideas to be applicable to the majority of runtime checks in an embedded application.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Use of Java in the Context of AUTOSAR 4.0: Expectations and Possibilities

Modern cars contain a large number of diverse microcontrollers for a wide range of tasks, which imposes high efforts in the integration process of hardware and software. There is a paradigm shift from a federated architecture to an integrated architecture with commonly used resources to reduce complexity, costs, weight and energy. AUTOSAR [3] is a system platform that allows the integration of ...

متن کامل

Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection

Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of both of these problems is the lack of enforceable memory protection between module boundaries. Clear module boundaries make dependencies explicit, resulting in more reliable and maintainable code. Mondriaan Memory Protecti...

متن کامل

Protection Strategies for Direct Access to Virtualized I/O Devices

Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory management units (IOMMUs) and recently proposed software-based methods can be used to reduce the overhead of I/O virtualization by providing untrusted guest operating systems with safe, direct access to I/O devices. This...

متن کامل

Software-Based Memory Protection In Sensor Nodes

Typical sensor nodes are resource constrained microcontrollers containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. In this paper, we propose a memory protection scheme t...

متن کامل

A Case for Language-Based Protection

The use of language mechanisms to enforce protection boundaries around software modules has become increasingly attractive. This paper examines the advantages and disadvantages of languagebased protection over more traditional protection mechanisms, such as standard virtual memory protection hardware, software fault isolation, and capability systems. Arguably, state-of-the-art language-based pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010