Skip to main content

Showing 1–5 of 5 results for author: Hönig, T

Searching in archive cs. Search in all archives.
.
  1. VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions

    Authors: Luis Gerhorst, Henriette Herzog, Peter Wägemann, Maximilian Ott, Rüdiger Kapitza, Timo Hönig

    Abstract: High-performance IO demands low-overhead communication between user- and kernel space. This demand can no longer be fulfilled by traditional system calls. Linux's extended Berkeley Packet Filter (BPF) avoids user-/kernel transitions by just-in-time compiling user-provided bytecode and executing it in kernel mode with near-native speed. To still isolate BPF programs from the kernel, they are static… ▽ More

    Submitted 8 January, 2025; v1 submitted 30 April, 2024; originally announced May 2024.

    Comments: RAID'24

    MSC Class: 68M25 ACM Class: D.4.6

  2. Migration-Based Synchronization

    Authors: Stefan Reif, Phillip Raffeck, Luis Gerhorst, Wolfgang Schröder-Preikschat, Timo Hönig

    Abstract: A fundamental challenge in multi- and many-core systems is the correct execution of concurrent access to shared data. A common drawback from existing synchronization mechanisms is the loss of data locality as the shared data is transferred between the accessing cores. In real-time systems, this is especially important as knowledge about data access times is crucial to establish bounds on execution… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Journal ref: SBESC'21: Proceedings of the XI Brazilian Symposium on Computing Systems Engineering. 2021. IEEE, Pages 1-8

  3. arXiv:2201.13160  [pdf, other

    cs.CR cs.OS cs.PL

    AnyCall: Fast and Flexible System-Call Aggregation

    Authors: Luis Gerhorst, Benedict Herzog, Stefan Reif, Wolfgang Schröder-Preikschat, Timo Hönig

    Abstract: Operating systems rely on system calls to allow the controlled communication of isolated processes with the kernel and other processes. Every system call includes a processor mode switch from the unprivileged user mode to the privileged kernel mode. Although processor mode switches are the essential isolation mechanism to guarantee the system's integrity, they induce direct and indirect performanc… ▽ More

    Submitted 31 January, 2022; originally announced January 2022.

    Journal ref: PLOS'21: Proceedings of the 11th Workshop on Programming Languages and Operating Systems. 2021. Association for Computing Machinery (ACM), New York, NY, USA, Pages 1-8

  4. $Δ$elta: Differential Energy-Efficiency, Latency, and Timing Analysis for Real-Time Networks

    Authors: Stefan Reif, Andreas Schmidt, Timo Hönig, Thorsten Herfet, Wolfgang Schröder-Preikschat

    Abstract: The continuously increasing degree of automation in many areas (e.g. manufacturing engineering, public infrastructure) lead to the construction of cyber-physical systems and cyber-physical networks. To both, time and energy are the most critical operating resources. Considering for instance the Tactile Internet specification, end-to-end latencies in these systems must be below 1ms, which means tha… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

  5. X-Lap: A Systems Approach for Cross-Layer Profiling and Latency Analysis for Cyber-Physical Networks

    Authors: Stefan Reif, Andreas Schmidt, Timo Hönig, Thorsten Herfet, Wolfgang Schröder-Preikschat

    Abstract: Networked control applications for cyber-physical networks demand predictable and reliable real-time communication. Applications of this domain have to cooperate with network protocols, the operating system, and the hardware to improve safety properties and increase resource efficiency. In consequence, a cross-layer approach is necessary for the design and holistic optimisation of cyber-physical s… ▽ More

    Submitted 20 August, 2018; originally announced August 2018.