AN EFFICIENT CACHE-BASED ACCESS ANOMALY DETECTION SCHEME

被引:0
|
作者
MIN, SL
CHOI, JD
机构
[1] PUSAN NATL UNIV,DEPT COMP ENGN,PUSAN 609735,SOUTH KOREA
[2] IBM CORP,THOMAS J WATSON RES CTR,YORKTOWN HTS,NY 10598
来源
SIGPLAN NOTICES | 1991年 / 26卷 / 04期
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One important issue in parallel program debugging is the efficient detection of access anomalies caused by uncoordinated accesses to shared variables. On-the-fly detection of access anomalies has two advantages over static analysis or post-mortem trace analysis. First, it reports only actual anomalies during execution. Second, it produces shorter traces for post-mortem analysis purposes if an anomaly is detected, since generating further trace information after the detection of an anomaly is of dubious value. Existing methods for on-the-fly access anomaly detection suffer from performance penalties since the execution of the program being debugged has to be interrupted on every access to shared variables. In this paper, we propose an efficient cache-based access anomaly detection scheme that piggybacks on the overhead already paid by the underlying cache coherence protocol.
引用
收藏
页码:235 / 244
页数:10
相关论文
共 50 条
  • [41] CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion
    Wen, Sheng
    Zhou, Wei
    Xiang, Yang
    Zhou, Wanlei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10): : 1137 - 1153
  • [42] The collective: A cache-based system management architecture
    Chandra, R
    Zeldovich, N
    Sapuntzakis, C
    Lam, MS
    USENIX ASSOCIATION PROCEEDINGS OF THE 2ND SYMPOSIUM ON NETWORKED SYSTEMS DESIGN & IMPLEMENTATION (NSDI '05), 2005, : 259 - 272
  • [43] A CACHE-BASED LANGUAGE MODEL FOR SPEECH RECOGNITION
    KUHN, R
    DEMORI, R
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1992, 14 (06) : 691 - 692
  • [44] Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting
    Li, Haipeng
    Niu, Nan
    Wang, Boyang
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 252 - 263
  • [45] Detecting Cache-Based Side Channel Attacks in the Cloud: An Approach with Cascade Detection Mode
    Yu, Si
    Gui, Xiaolin
    Zhang, Xuejun
    Lin, Jiancai
    Dai, Min
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 903 - 915
  • [46] Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters
    Bazm, Mohammad-Mahdi
    Sautereau, Thibaut
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 7 - 12
  • [47] AnoGLA: An efficient scheme to improve network anomaly detection
    Ding, Qingfeng
    Li, Jinguo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [48] Design and implementation of a cache-based granular computing system
    Huang, Xiaoxia
    Cheng, Lun
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
  • [50] Cache-Based Matrix Technology for Efficient Write and Recovery in Erasure Coding Distributed File Systems
    Shin, Dong-Jin
    Kim, Jeong-Joon
    SYMMETRY-BASEL, 2023, 15 (04):