• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu. Critical Memory Data Access Monitor Based on Dynamic Strategy Learning[J]. Journal of Computer Research and Development, 2019, 56(7): 1470-1487. DOI: 10.7544/issn1000-1239.2019.20180577
Citation: Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu. Critical Memory Data Access Monitor Based on Dynamic Strategy Learning[J]. Journal of Computer Research and Development, 2019, 56(7): 1470-1487. DOI: 10.7544/issn1000-1239.2019.20180577

Critical Memory Data Access Monitor Based on Dynamic Strategy Learning

More Information
  • Published Date: June 30, 2019
  • VMM-based approaches have been widely adopted to monitor fine-grained memory accessing behavior through intercepting safety-critical memory accessing and critical instructions executing. However, intercepting memory accessing operations lead to significant performance overhead as CPU control travels to VMM frequently. Some existing approaches have been proposed to resolve the performance problem by centralizing safety critical data to given memory regions. However, these approaches need to modify the source code or binary file of the monitored system, and cannot change monitoring strategies during runtime. As a result, the application scenarios are limited. To reduce the performance overhead of monitoring memory access in this paper, we propose an approach, named DynMon, which controls safety-critical data access monitoring dynamically according to system runtime states. It does not dependent on source code and need not to modify binary file of the monitored systems. DynMon obtains dynamic monitor strategies by learning from historical data automatically. With system runtime status and monitor strategies, DynMon decides memory access monitoring region dynamically at runtime. As a result, DynMon can alleviate system performance burden by reducing safety irrelevant region monitoring. The evaluations prove that it can alleviate 22.23% performance cost compared with no dynamic monitor strategy. Besides, the performance overhead will not increase significantly with large numbers of monitored data.
  • Related Articles

    [1]Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun. Trajectory Privacy Protection Method Based on Multi-Anonymizer[J]. Journal of Computer Research and Development, 2019, 56(3): 576-584. DOI: 10.7544/issn1000-1239.2019.20180033
    [2]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [3]Xia Zhuoqun, Hu Zhenzhen, Luo Junpeng, Chen Yueyue. Adaptive Trajectory Prediction for Moving Objects in Uncertain Environment[J]. Journal of Computer Research and Development, 2017, 54(11): 2434-2444. DOI: 10.7544/issn1000-1239.2017.20170309
    [4]Li Yang, Wang Zhe, Zhang Chuwen, Dai Huichen, Xu Wenquan, Ji Xuefeng, Wan Ying, Liu Bin. Trajectory Prediction Algorithm in VANET Routing[J]. Journal of Computer Research and Development, 2017, 54(11): 2421-2433. DOI: 10.7544/issn1000-1239.2017.20170359
    [5]Zhang Fengjun, Zhao Ling, An Guocheng, Wang Hongan, Dai Guozhong. Mean Shift Tracking Algorithm with Scale Adaptation[J]. Journal of Computer Research and Development, 2014, 51(1): 215-224.
    [6]Li Shanqing, Tang Liang, Liu Keyan, Wang Lei. A Fast and Adaptive Object Tracking Method[J]. Journal of Computer Research and Development, 2012, 49(2): 383-391.
    [7]Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
    [8]An Guocheng, Zhang Fengjun, Wang Hongan, and Dai Guozhong. Multi-Window Target Tracking[J]. Journal of Computer Research and Development, 2011, 48(11): 2023-2030.
    [9]Guo Kangde, Zhang Mingmin, Sun Chao, Li Yang, Tang Xing. 3D Fingertip Tracking Algorithm Based on Computer Vision[J]. Journal of Computer Research and Development, 2010, 47(6): 1013-1019.
    [10]Li Guohui and Zhong Xiya. Indexing Moving Objects Trajectories on Fixed Networks[J]. Journal of Computer Research and Development, 2006, 43(5): 828-833.

Catalog

    Article views (1028) PDF downloads (215) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return