期刊文献+

一种基于微内核操作系统进程间通信恢复方法

AN IPC RECOVERY METHOD BASED ON MICROKERNEL OPERATING SYSTEM
下载PDF
导出
摘要 微内核架构为操作系统提供了良好的隔离性,高度模块化的架构设计使得微内核架构操作系统对进程间通信的依赖度极高,进程间通信恢复是系统恢复正常运行的关键。权能是微内核架构操作系统中进程对资源操作权限的描述,决定进程间能否进行通信。针对微内核操作系统在系统服务恢复过程中出现的进程间通信信道丢失问题,提出并实现了一种进程间通信恢复方法。在通信异常时保存权能信息,用于在系统关键服务恢复过程中重新建立客户程序与服务程序的进程间通信信道。实验结果表明所提出的方法是有效的,可以提高操作系统的可靠性。 Microkernel architecture provides good features of isolation to operating system.The architecture design in high modularity makes the operating system of microkernel architecture highly depend on inter-process communication (IPC).Therefore the recovery from errors in inter-process communications is the key to the recovery of microkernel system working properly.In operating system of microkernel architecture,capability is the term to describe the privilege of resources operation by the process,which determines whether communication can work between two processes.We design and realise an IPC recovery method for the problem of microkernel operating system that the IPC channel will lose during the process of system service recovery.It can save the capability information when communication anomaly occurs, and then applies the information to reconstructing the IPC channels between client programs and services programs when recovering key system services.Experimental results show that the proposed method is effective.With this method,system reliability can be enhanced.
出处 《计算机应用与软件》 CSCD 2015年第6期9-13,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61305054) 中国科学院知识创新工程重要方向性项目(KGCX2-YW-12) 国家"核高基"重大科技专项(2010ZX01036-001-002-2)
关键词 微内核 操作系统安全 进程间通信 可信恢复 Microkernel Operating system security IPC Trusted recovery
  • 相关文献

参考文献12

  • 1Swift M M,Annamalai M,Bershad B N.Recovering device drivers[J].ACM Transactions on Computer Systems,2006,24(4):333-360.
  • 2Swift M M,Bershad B N,Levy H M.Improving the reliability of commodity operating systems[J].ACM SIGOPS Operating Systems Review,2003,37(5):207-222.
  • 3Herder J N,Bos H,Gras B.Minix 3:a highly reliable,self-repairing operating system[J].ACM SIGOPS Operating Systems Review,2006,40(3):80-89.
  • 4Tanenbaum A S,Herder J N,Bos H.Can we make operating systems reliable and secure[J].Computer,2006,39(5):44-51.
  • 5David F M,Chan E,Carlyle J C.Curi OS:Improving Reliability through Operating System Structure[C]//Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation.San Diego,California,USA.2008:59-72.
  • 6Klein G.Operating system verification—an overview[J].Sadhana Academy Proceedings in Engineering Sciences,2009,34(1):27-69.
  • 7Hohmuth M.The fiasco kernel:requirements definition[M].Techn.Univ.,Fakultt Informatik,1998.
  • 8Kadav A,Renzelmann M J,Swift M M.Fine-Grained Fault Tolerance using Device Checkpoints[C]//Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems.Houston,Texas,USA.ACM,2013:473-484.
  • 9包必显,曾庆凯.一种基于数据流依赖关系的可信恢复方法[J].计算机应用,2008,28(10):2467-2470. 被引量:1
  • 10Depoutovitch,Alex,Michael Stumm.Otherworld:giving applications a chance to survive OS kernel crashes[C]//Proceedings of the 5th European conference on Computer systems.Paris,France.ACM,2010:181-194.

二级参考文献15

  • 1STEVEN M. Computer security - An end state? [ J] Communications of the ACM, 2001, 44(3): 131 -132.
  • 2JAJODIA S, AMMANN P, McCOLLUM C D. Surviving information warfare attacks [ J]. Computer, 1999, 32(4): 57 -63.
  • 3HITZ D, LAU J, MALCOLM M. File system design for an NFS file server appliance[ C]//Winter 1994 USENIX Conference. Berkeley, CA, USA: USENIX Association, 1994:19-19.
  • 4SANTRY D, FEELEY M, HUTCHINSON N, et al. Deciding when to forget in the elephant file system [ C]// Proceedings of the 17th ACM Symposium on Operating System Principles. New York: ACM Press, 1999: 110-123.
  • 5GOEL A, FENG W C. Forensix: A robust, high-performance reconstruction system [ C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops. Washiugton, DC: IEEE Computer Society, 2005:155 - 162.
  • 6GOEL A, FENG W C, MAIER D, et al. Automatic high-performance reconstruction and recovery[ J]. Journal of Computer of Computer Networks, 51(5) : 1361 - 1377.
  • 7GOEL A, PO K, FARHADI K, et al. The taser intrusion recovery system[C]// ACM SOSP. New York, USA: ACM, 2005: 163- 176.
  • 8FORREST S, HOFMEYR S A, SOMAYAJI A, et al. A sense of self for unix processes[ C]// IEEE Symposium on Security and Privacy. Oakland, California, USA: IEEE Computer Society, 1996: 120 - 128.
  • 9HOFMEYR S A, FORREST S, SOMAYAJI A. Intrusion detection using sequences of system calls [ J]. Journal of Computer Security, 1998, 6(3): 151 -180.
  • 10KO C, RUSCHITZKA M, LEVITT K. Execution monitoring of security-critical programs in distributed systems: aspecification-based approach [ C]// Proceedings of the 1997 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1997: 175.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部