首页> 外文会议>High-Performance Computing, 1997. Proceedings. Fourth International Conference on >A comparison of two context allocation approaches for fastprotected calls
【24h】

A comparison of two context allocation approaches for fastprotected calls

机译:两种上下文分配方法的比较,以实现快速受保护的通话

获取原文

摘要

Secure computing systems require the implementation of protectiondomains and a safe way of transferring control across such domains.Isolating the contexts (activation stacks) of the caller and the callee,to avoid unintended information flow, is a fundamental requirement forimplementing cross-domain transfers. We present and evaluate twoapproaches for implementing contexts for cross-domain calls in aconventional pipelined architecture retrofitted with a simple capabilitymechanism. The first and the more traditional approach is to useseparate context segments for the caller and the callee. The second isto use a unified context segment supported by some modest hardware foravoiding unintended information flow. Simulation results indicate thatthe unified context solution performs markedly better than the separatecontext solution. Also, the overall overhead of the protected callmechanism using the unified context is about 10-30%-a price that may beworth paying for the resulting security
机译:安全计算系统需要实施保护 域,以及在此类域之间转移控制权的安全方式。 隔离调用方和被调用方的上下文(激活堆栈), 避免意外的信息流,这是 实施跨域转移。我们提出并评估两个 一种实现跨域调用上下文的方法 具有简单功能的传统流水线架构改造 机制。第一种和更传统的方法是使用 呼叫者和被呼叫者的单独上下文段。第二个是 将某些适度的硬件支持的统一上下文段用于 避免意外的信息流。仿真结果表明 统一上下文解决方案的性能明显优于单独的上下文解决方案 上下文解决方案。同样,受保护呼叫的总开销 使用统一上下文的机制大约是10%至30%,这可能是 值得为此而付出的代价

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号