동현 유
척척석사
동현 유
전체 방문자
오늘
어제
  • 분류 전체보기 (178)
    • BlockChain (48)
      • [paper] Consensus (13)
      • [paper] Execution (19)
      • [paper] Storage (5)
      • [paper] ZKP (1)
      • [paper] Oracle (1)
      • Blockchains (9)
    • Java (19)
      • Java의 정석 (13)
      • Java 파헤치기 (5)
    • Python (20)
      • Python 뜯어보기 (6)
      • 데이터 분석 기초 (5)
      • Python 기초 강의 (6)
      • Python 기초 강의 부록 (3)
    • Golang (0)
    • MySQL (3)
      • programmers (2)
      • 기본 문법 (0)
    • 웹 프로젝트 (IBAS) (36)
      • Django 레거시 (14)
      • SpringBoot api 개편 (14)
      • Infra (3)
      • 서버 장애 기록 (4)
      • 신입팀원 교육 자료 (1)
    • CS (30)
      • Operating System (22)
      • Computer Security (3)
      • Network (4)
      • DBMS (1)
    • 책 (10)
      • 도메인 주도 설계 철저 입문 (9)
      • Real MySQL 8.0 (1)
    • BOJ 문제 풀이 (3)
    • 이러쿵저러쿵 (7)
    • 회고 (1)

인기 글

최근 댓글

최근 글

hELLO · Designed By 정상우.
동현 유

척척석사

[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution
CS/Operating System

[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution

2023. 5. 23. 21:01

Authors:

Dmitry Kuznetsov and Adam Morrison, Tel Aviv University

 

Journal/Conference:

USENIX ATC 22'

 

Source:

https://www.usenix.org/conference/atc22/presentation/kuznetsov

 

Presentation material:

 

ppt Privbox Faster System Calls Through Sandboxed Privileged Execution.pdf
1.71MB


Abstract

  System calls are the main method for applications to request services from the operating system, but their invocation incurs considerable overhead, which has been aggravated by mitigation mechanisms for transient execution attacks. Proposed approaches for reducing system call overhead all break the semantic equivalence between system calls and regular function calls (e.g., by making system calls asynchronous), and so their adoption requires rearchitecting applications.

 

  This paper proposes Privbox, a new approach for lightweight system calls that maintains the familiar synchronous, function-like system call model. Privbox allows an application to execute system call-intensive code in a \emph{semi-privileged, sandboxed} execution mode, called a 'privbox'. Semi-privileged execution is architecturally similar to the kernel's privileged execution, which enables faster invocation of system calls, but the code is sandboxed to ensure that it cannot use its elevated privileges to compromise the system.

 

  We further propose semi-privileged access prevention (SPAP), a simple hardware architectural feature that alleviates much of Privbox's instrumentation overhead.   We implement Privbox based on Linux and LLVM. Our evaluation on x86 (Intel Skylake) hardware shows that Privbox (1) speeds up system call invocation by 2.2 times; (2) can increase throughput of I/O-threaded applications by up to 1.7 times; and (3) can increase the throughput of real-world workloads such as Redis by up to 7.6% and 11%, without and with SPAP, respectively.

 


Design


Implementation


HW optimization


Evaluation


Discussion

 

  • How exactly does the Privbox manage custum page table? Usually a page table is allocated per one process. 

'CS > Operating System' 카테고리의 다른 글

멀티코어에서 캐시 일관성 프로토콜. (w/ chat-gpt)  (0) 2025.04.02
[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique  (0) 2023.05.23
[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection  (0) 2023.05.21
[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh  (0) 2023.05.20
[논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms  (0) 2023.05.19
    동현 유
    동현 유
    Fault Tolerant System Researcher for more Trustful World and Better Lives. (LinkedIn: https://www.linkedin.com/in/donghyeon-ryu-526b8a276/)

    티스토리툴바