PPT-Scheduler-based Defenses against Cross-VM Side-channels
Author : phoebe-click | Published Date : 2019-03-12
Venkat anathan Varadarajan Thomas Ristenpart and Michael Swift 1 Department of Computer Sciences VMM Public Clouds EC2 Azure Rackspace Interface VM Multitenancy
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Scheduler-based Defenses against Cross-V..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Scheduler-based Defenses against Cross-VM Side-channels: Transcript
Venkat anathan Varadarajan Thomas Ristenpart and Michael Swift 1 Department of Computer Sciences VMM Public Clouds EC2 Azure Rackspace Interface VM Multitenancy Different customers virtual machines VMs share same server. Proportionalshare is based around a simple con cept instead of optimizing for turnaround or response time a scheduler m ight instead try to guarantee that each job obtain a certain percentage of CPU time An excellent modern example of proportionalsh 6/16/2010. Work Stealing Scheduler. 1. Announcements. Text books. Assignment 1. Assignment 0 results. Upcoming Guest lectures. 6/16/2010. Work Stealing Scheduler. 2. Recommended Textbooks. 6/16/2010. Mutual Exclusion with Hardware Support. Thomas Plagemann. With slides from. Otto J. Anshus & Tore Larsen. (University of Tromsø). and Kai Li. (. Princeton University. ). Overview. Interrupts:. An Integrated Approach to Architecture and Operating Systems. Chapter 6. Processor Scheduling. ©Copyright 2009Umakishore Ramachandran and William D. Leahy Jr.. 6.1 Introduction. Things to Do. Laundry. Shane Wang. (王庆). , Intel Open Source Technology Center. 微信号:. qq559382. Agenda. What is current situation?. How scheduler works in Juno and Kilo. Resource Tracking. Filters and Weight. Mutual Exclusion with Hardware Support. Thomas Plagemann. With slides from. Otto J. Anshus & Tore Larsen. (University of Tromsø). and Kai Li. (. Princeton University. ). Preemptive Scheduling. Eugene Calaoagan. UERM Medicine 2011. M. ature and immature defenses. Immature Defenses. Acting Out . Expressing an unconscious wish or impulse through action to avoid being conscious of the accompanying effect. Concurrency Runtime. . Niklas. . Gustafsson. Software Architect. Microsoft Corporation. TL22. Introduction (10 min). Scheduler / RM internals (15 min). Scheduler / RM APIs (30 min). Agenda. Why is Microsoft building this?. 6/16/2010. Work Stealing Scheduler. 1. Announcements. Text books. Assignment 1. Assignment 0 results. Upcoming Guest lectures. 6/16/2010. Work Stealing Scheduler. 2. Recommended Textbooks. 6/16/2010. Anirudh . Sivaraman. , . Suvinay. Subramanian, Mohammad . Alizadeh. , Sharad . Chole. , Shang-. Tse. Chuang, Anurag Agrawal, Hari . Balakrishnan. , Tom . Edsall. , . Sachin. . Katti. , Nick McKeown. By. Siddiq Ahmed Syed. Roll No:7. Principles of simple scheduler architecture:. Transactions cannot request for lock ,it is . the scheduler . that take cares of it.. Scheduler inserts the lock and release the lock when it is notified by the transaction manager. Kay Ousterhout, Patrick Wendell, . Matei. . Zaharia. , . Ion . Stoica. Sparrow schedules tasks in clusters. using a . decentralized, randomized approach. Sparrow schedules tasks in clusters. using a . to . fire, by generate an action potential. . [Know the various steps in an ion . channe. leading to an action potential—I will ask you this on fina. l. ; e.g. imagine that ion channels are made of some negative conducting channels.]. Attacks. Haotian Wang. Ph.D. . . Student. University of Idaho. Computer Science. Outline. Introduction. Defense . a. gainst . Adversarial Attack Methods. Gradient Masking/Obfuscation. Robust Optimization.
Download Document
Here is the link to download the presentation.
"Scheduler-based Defenses against Cross-VM Side-channels"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents