The offline nanovisor
Ben Yehuda, R., & Zaidenberg, N. J. (2022). The offline nanovisor. International Journal of Embedded Systems, 15(4), 289-299. https://doi.org/10.1504/IJES.2022.10050470
Julkaistu sarjassa
International Journal of Embedded SystemsPäivämäärä
2022Tekijänoikeudet
© Inderscience Publishers 2022
Current real-time technologies for Linux require partitioning for running RTOS alongside Linux or extensive kernel patching. The offline nanovisor is a minimal real-time library OS in a lightweight hypervisor under Linux. We describe a nanovisor that executes in an offline processor. An offline processor is a processor core removed from the running operating system. The offline processor executes userspace code through the use of a hyplet. The hyplet is a nanovisor that allows the kernel to execute userspace programs without delays. Combining these two technologies offers a way to achieve hard real-time in standard Linux. We demonstrate high-speed access in various use cases using a userspace timer in frequencies up to 20 kHz, with a jitter of a few hundred nanoseconds. We performed this on a relatively slow ARM processor.
Julkaisija
Inderscience PublishersISSN Hae Julkaisufoorumista
1741-1068Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/159242941
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Hypervisor memory acquisition for ARM
Ben Yehuda, Raz; Shlingbaum, Erez; Gershfeld, Yuval; Tayouri, Shaked; Zaidenberg, Nezer Jacob (Elsevier, 2021)Cyber forensics use memory acquisition in advanced forensics and malware analysis. We propose a hypervisor based memory acquisition tool. Our implementation extends the volatility memory forensics framework by reducing the ... -
Enforcing trust for execution-protection in modern environments
Resh, Amit (University of Jyväskylä, 2016)The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. ... -
Preventing reverse engineering of native and managed programs
Kiperberg, Michael (University of Jyväskylä, 2015)One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these ... -
Towards Service-oriented 5G : Virtualizing the Networks for Everything-as-a-Service
Chang, Zheng; Zhou, Zhenyu; Zhou, Sheng; Chen, Tao; Ristaniemi, Tapani (Institute of Electrical and Electronics Engineers, 2018)It is widely acknowledged that the forthcoming 5G architecture will be highly heterogeneous and deployed with high degree of density. These changes over the current 4G bring many challenges on how to achieve an efficient ... -
Towards Journalism Everywhere : The New Opportunities and Challenges of Real-Time News Streams in Finland
Uskali, Turo (Peter Lang, 2018)
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.