Sources
Use for significance of the study
- Y. Judith Petrizia, R. Sujitha, Sree Saradha M, International Journal of Advanced Research in Science, Communication and Technology, “Overview of Process Management in Operating Systems” - 2025-02
- Buerian Soongpol, Paniti Netinant, Meennapa Rukhiran, Sustainability, “Practical Sustainable Software Development in Architectural Flexibility for Energy Efficiency Using the Extended Agile Framework” - 2024
- Amin Vahdat, Alvin Lebeck, Carla Schlatter Ellis, Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system, “Every Joule is Precious: The Case for Revisiting Operating System Design for Energy Efficiency” - 2000-10-17
Use for related literature and issues. REFERENCE SHOULD BE <5 YEARS OLD
- Hamed Dinari, International Journal of Modern Education and Computer Science, “Inter-Process Communication (IPC) in Distributed Environments: An Investigation and Performance Analysis of Some Middleware Technologies” - 2020-04-08
- Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis, International Journal of Information Security, “IntentAuth: Securing Android’s Intent-based inter-process communication” - 2022-04-22
- Dinglan Peng, Congyu Liu, Tapti Palit, Pedro Fonseca, Anjo Vahldiek-Oberwagner, Mona Vij, IEEE, “μSwitch: Fast Kernel Context Isolation with Implicit Context Switches” - 2023-07-21
- Jack Tigar Humphries, Kostis Kaffes, David Mazières, Christos Kozyrakis, HotOS ‘21: Proceedings of the Workshop on Hot Topics in Operating Systems, “A case against (most) context switches” - 2021-06-03
Significance of Process Management
Discuss who will benefit from exploring this topic and how they will benefit
Importance of Process Management:
- Better overall system performance and responsiveness
- Efficient resource allocation
- Maintained system stability
- Energy efficiency and sustainability
Beneficiaries:
- Users - better experience as a result of enhanced system performance
- Businesses - increasing efficiency and sustainability demands in digital services
Related Literature
To identify (some optional):
- Identify problem found
- Key concepts
- Identify solution developed and results
- Strength and weakness
- Identify gaps in research
Kernel Context Isolation and Context Switching
- Problem
- It is important to isolate application components for security
- they safeguard sensitive data and code
- There are massive performance costs to isolating application components using the process-based approach—the commonly used approach to application isolation
- The current solutions are insufficient
- stuff like kernel abstraction and CPU extensions, and etc. does not isolate enough kernel resources like file descriptors
- It is important to isolate application components for security
- Solution
- They introduce a kernel isolation mechanism that includes memory protection
- This sufficiently isolates kernel resources with much lesser performance overhead
- Results and assessment
- After testing it on Firefox libraries and HTTP servers, they claim that the isolation overhead got reduced by about 32.7-98.4% when compared to other techniques
- They first tried it on the media decoding and Gzip decompression features of Firefox
- They then observed the latency and resource utilization of the technique on loading pages using Firefox
- They measured HTTP Server performance using a benchmarking tool called bombardierto. They discover that their solution results in significantly less overhead.
- From a security standpoint
- the usage of Intel MPK provides memory isolation and guarantees hardware memory protection
- Their implementation demonstrates that context switching can be safely done when using the Write Data to User Page Key Register (WRPKRU) and Restore Processor Extended States (XRSTOR) instructions.
- They were able to show that attackers cannot exploit several system calls to escape their kernel context isolation.
- Gaps
- MPK combined with their solution is limited by the number of concurrent muContext’s per address space.
- It requires refactoring effort from developers.
- It can still be extended to support workloads where IPC overhead is important
Why Context Switching Should Mostly Be Eliminated
- Problem
- Frequent context switches causes high overheads and severely worsens the complexity of kernels and applications
- Regular execution stream is disrupted as a result and makes it costly to perform save and resume states
- Solution
- Hardware threading model should be radically changed to focus on software problems instead of hardware ones
- It makes thread multiplexing obsolete by introducing a lot of hardware threads to each physical core
- ISA extensions is also presented to let the kernel and user software to leverage the threading model:
- this allows developers to eliminate interrupt and implement fast I/O without poling
- leads to simpler distributed programming models
- fast hypervisors
- system without exceptions
- Benefits
- The work involved with interrupt processing is avoided. An alternative means would let kernel designate hardware thread per core per interrupt type.
- Polling becomes unnecessary because this model would reduce the resource penalties of notifying waiting threads. A lot of threads per core would make polling useless because polling would only complicate core allocation.
- The threading models allows for system calls and VM-exits to operate in dedicated hardware threads without the mode switching overheads.
- Their model allows for kernel code to execute in one hardware thread and application code in a different hardware thread, thereby also allowing for kernels to use FP and vector operations and link with libraries, while also not having an effect on system call invocation latency
- Microkernel and container proxies performance and speed is improved by mitigating the excessive scheduling delays through a lot of software-managed threads.
- This model can allow isolation and alleviate code restrictions without sacrificing performance, unlike Hypervisors on today’s CPUs that rely on privileged access to host OS in order to have good performance
- The lack of hardware threads per physical cores led to distributed applications to depend on multiplex software threads on top of hardware threads. However, with much more hardware threads, distributed programming can be simplified, wherein developers can assign one hardware thread per request while avoiding thread scheduling overheads.
Android IPC
- Problem
- Android’s IPC mechanism implementation is vulnerable to intent redirection
- Malicious applications can start Android intent redirection and intent hijacking attacks to threaten user data confidentiality and integrity.
- Intent redirection involves malicious applications exploiting the publicly available exported components of legitimate applications to send malicious data to their components and services.
- These components and services receiving the malicious data may be involved with sensitive data operations, and, as such, exploiting them can allow hijacking attacks to gain unauthorized access to private data.
- the current Android IPC mechanism does not validate the identity of the IPC source and/or destination entities
- Solution
- IntentAuth was developed to provide an IPC mechanism with better security and a feature that allows users to control application interactions (user-defined policies)
- It provides encryption for intent data transmission
- It provides a way to authenticate the source/destination of inter-process communication
- It supports secure key storage components
- Benefits
- Because the weakest link of security for Android applications is the developers, this mechanism takes a user-centric approach independent of static policies defined by developers. It gives additional security services to strengthen the security of inter-process communication and enforce authentication and encryption.
Middleware Technologies and IPC
- Significance
- Distributed systems have proliferated and are gradually becoming more embedded in our everyday lives. They are involved in data processing, medical science, industrial control systems, aerospace, and enterprise applications.
- IPC is a fundamental component of distributed systems.
- This paper aims to evaluate the performance of several IPC methods
- Findings
- The socket as basic IPC yielded the best results in terms of speed
- The reason being is they avoid applying additional operations on the input data that will be sent.
- Nonetheless, their performance is worsened as a result of adding additional layers
- Additional layers are necessary for extra features, such as the elimination of platform dependencies and asynchronous communication
- The socket as basic IPC yielded the best results in terms of speed