Change search
Link to record
Permanent link

Direct link
Publications (10 of 21) Show all publications
Drejhammar, F. & Rasmusson, L. (2014). BEAMJIT: a just-in-time compiling runtime for Erlang (7ed.). In: : . Paper presented at The Thirteenth ACM SIGPLAN Workshop on Erlang (pp. 61-72).
Open this publication in new window or tab >>BEAMJIT: a just-in-time compiling runtime for Erlang
2014 (English)Conference paper, Published paper (Refereed)
Abstract [en]

BEAMJIT is a tracing just-in-time compiling runtime for the Erlang programming language. The core parts of BEAMJIT are synthesized from the C source code of BEAM, the reference Erlang abstract machine. The source code for BEAM's instructions is extracted automatically from BEAM's emulator loop. A tracing version of the abstract machine, as well as a code generator are synthesized. BEAMJIT uses the LLVM toolkit for optimization and native code emission. The automatic synthesis process greatly reduces the amount of manual work required to maintain a just-in-time compiler as it automatically tracks the BEAM system. The performance is evaluated with HiPE's, the Erlang ahead-of-time native compiler, benchmark suite. For most benchmarks BEAMJIT delivers a performance improvement compared to BEAM, although in some cases, with known causes, it fails to deliver a performance boost. BEAMJIT does not yet match the performance of HiPE mainly because it does not yet implement Erlang specific optimizations such as boxing/unboxing elimination and a deep understanding of BIFs. Despite this BEAMJIT, for some benchmarks, reduces the runtime with up to 40\%.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24378 (URN)10.1145/2633448.2633450 (DOI)2-s2.0-84907398577 (Scopus ID)
Conference
The Thirteenth ACM SIGPLAN Workshop on Erlang
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Rasmusson, L. & Nasab, M. R. (2013). Hypervisor integrity measurement assistant. In: CLOSER 2013 - Proceedings of the 3rd International Conference on Cloud Computing and Services Science: . Paper presented at 3rd International Conference on Cloud Computing and Services Science, CLOSER 2013, 8 May 2013 through 10 May 2013, Aachen (pp. 26-35).
Open this publication in new window or tab >>Hypervisor integrity measurement assistant
2013 (English)In: CLOSER 2013 - Proceedings of the 3rd International Conference on Cloud Computing and Services Science, 2013, p. 26-35Conference paper, Published paper (Refereed)
Abstract [en]

An attacker who has gained access to a computer may want to run arbitrary programs of his choice, and upload or modify configuration files, etc. We can severely restrict the power of the attacker by having a white-list of approved file checksums and a mechanism that prevents the kernel from loading any file with a bad checksum. The check may be placed in the kernel, but that requires a kernel that is prepared for it. The check may also be placed in a hypervisor which intercepts the kernel and prevents the kernel from loading a bad file. Moving the integrity check out from the VM kernel makes it harder for the intruder to bypass the check. We describe the implementation of two systems and give performance results. In the first implementation the checksumming and decision is performed by the hypervisor instead of by the kernel. In the second implementation the kernel computes the checksum and only the final integrity decision is made by the hypervisor. We conclude that it is technically possible to put file integrity control into the hypervisor, both for kernels without and with pre-compiled support for integrity measurement.

Keywords
Checksumming, Cloud computing, Hosted computing, Machine code inspection, Security, Untrusted code, Virtual machine, Machine codes, Virtual machines, Loading
National Category
Engineering and Technology
Identifiers
urn:nbn:se:ri:diva-47616 (URN)2-s2.0-84884471746 (Scopus ID)9789898565525 (ISBN)
Conference
3rd International Conference on Cloud Computing and Services Science, CLOSER 2013, 8 May 2013 through 10 May 2013, Aachen
Available from: 2020-09-01 Created: 2020-09-01 Last updated: 2023-05-25Bibliographically approved
Rasmusson, L. & Corcoran, D. (2013). Performance overhead of KVM on Linux 3.9 on ARM Cortex-A15 (9ed.). Proceedings of Workshop on Virtualization for Real-Time Embedded Systems
Open this publication in new window or tab >>Performance overhead of KVM on Linux 3.9 on ARM Cortex-A15
2013 (English)In: Proceedings of Workshop on Virtualization for Real-Time Embedded SystemsArticle in journal (Refereed) Published
Abstract [en]

 A number of simple performance measurements on network, CPU and disk speed were done on a dual ARM Cortex- A15 machine running Linux inside a KVM virtual machine that uses virtio disk and networking. Unexpected behaviour was observed in the CPU and memory intensive benchmarks, and in the networking benchmarks. The average overhead of running inside KVM is between zero and 30 percent when the host is lightly loaded (running only the system software and the necessary qemu-system-arm virtualization code), but the relative overhead increases when both host and VM is busy. We conjecture that this is related to the scheduling inside the host Linux.

Keywords
ARM Cortex-A15, HVM, Linux KVM, virtualization, performance
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24245 (URN)
Projects
hyperv
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Rasmusson, L. & Rajabi Nasab, M. (2012). Hypervisor Integrity Measurement Assistant (11ed.). Kista, Sweden: Swedish Institute of Computer Science
Open this publication in new window or tab >>Hypervisor Integrity Measurement Assistant
2012 (English)Report (Other academic)
Abstract [en]

An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and preventing the kernel from loading loading any file with a bad checksum. The check may be placed in the kernel, but that requires a kernel that is prepared for it. The check may also be placed in a hypervisor which intercepts and prevents the kernel from loading a bad file. We describe the implementation of and give performance results for two systems. In one the checksumming, or integrity measurement, and decision is performed by the hypervisor instead of the OS. In the other only the final integrity decision is done in the hypervisor. By moving the integrity check out from the VM kernel it becomes harder for the intruder to bypass the check. We conclude that it is technically possible to put file integrity control into the hypervisor, both for kernels without and with pre-compiled support for integrity measurement.

Place, publisher, year, edition, pages
Kista, Sweden: Swedish Institute of Computer Science, 2012 Edition: 11
Series
SICS Technical Report, ISSN 1100-3154 ; 2012:06
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24054 (URN)
Projects
TESPEVSCNS
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Rasmusson, L. & Aslam, M. (2012). Protecting Private Data in the Cloud (16ed.). In: Proceedings of The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012: . Paper presented at The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 (pp. 5-12).
Open this publication in new window or tab >>Protecting Private Data in the Cloud
2012 (English)In: Proceedings of The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 2012, 16, p. 5-12Conference paper, Published paper (Refereed)
Abstract [en]

Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company. We describe a system organization that prevents host administrators from directly accessing or installing eaves-dropping software on the machine that holds the client's valuable data. Clients are monitored via machine code probes that are inlined into the clients' programs at runtime. The system enables the cloud provider to install and remove software probes into the machine code without stopping the client's program, and it prevents the provider from installing probes not granted by the client.

Keywords
cloud computing, virtualization, trusted computing, binary translation
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24020 (URN)2-s2.0-84864866703 (Scopus ID)
Conference
The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012
Projects
TESPEV
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Aslam, M., Gehrmann, C., Rasmusson, L. & Björkman, M. (2012). Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud (12ed.). In: : . Paper presented at International Conference on Cloud Computing and Services Science, CLOSER 2012.
Open this publication in new window or tab >>Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud
2012 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the provider promised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-23987 (URN)
Conference
International Conference on Cloud Computing and Services Science, CLOSER 2012
Projects
TESPEVS
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Aslam, M., Gehrmann, C., Rasmusson, L. & Björkman, M. (2012). Securely launching virtual machines on trustworthy platforms in a public cloud: An enterprise's perspective. In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science: . Paper presented at 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18 April 2012 through 21 April 2012, Porto (pp. 511-521).
Open this publication in new window or tab >>Securely launching virtual machines on trustworthy platforms in a public cloud: An enterprise's perspective
2012 (English)In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 2012, p. 511-521Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the providerpromised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.

Keywords
Cloud computing, IaaS, Security, Trusted computing, Virtualization, Clear text, Cloud models, Computer configuration, Computing resource, Full-scale system, Outsource, Platform integrity, Security risks, System security, Virtual machines, Virtualizations, Computer simulation, Industry
National Category
Engineering and Technology
Identifiers
urn:nbn:se:ri:diva-51820 (URN)2-s2.0-84864878200 (Scopus ID)9789898565051 (ISBN)
Conference
2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18 April 2012 through 21 April 2012, Porto
Available from: 2021-01-12 Created: 2021-01-12 Last updated: 2023-05-25Bibliographically approved
Bjurling, B., Rasmusson, L. & Johansson, U. M. (2008). Qualitative policies for bandwidth priorities in ad-hoc networks (1ed.). In: Proc. IEEE 27th Conference on Computer Communications: . Paper presented at First International Workshop on Automated Network Management, April 13-18, 2008, Phoenix, AZ, USA.
Open this publication in new window or tab >>Qualitative policies for bandwidth priorities in ad-hoc networks
2008 (English)In: Proc. IEEE 27th Conference on Computer Communications, 2008, 1Conference paper, Published paper (Refereed)
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-22901 (URN)
Conference
First International Workshop on Automated Network Management, April 13-18, 2008, Phoenix, AZ, USA
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Rasmusson, L. & Janson, S. (2007). Libra, a Multi-hop Radio Network Bandwidth Market (1ed.). In: : . Paper presented at 7th Scandinavian Workshop on Wireless Ad-hoc & Sensor Networks (ADHOC'07), 2-3 May 2007, Stockholm, Sweden.
Open this publication in new window or tab >>Libra, a Multi-hop Radio Network Bandwidth Market
2007 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Libra is a two-level market which assigns fractional shares of time to the transmitting nodes in local regions of a multi-hop network. In Libra, users are assigned budgets by management and users assign funding to services within their budget limits. The purpose is to prioritize users and also optimize network utilization by preventing source nodes from injecting too much traffic into the network and thereby causing downstream packet loss. All transmitting nodes sell capacity in the region surrounding them, and buy capacity from their neighbors in order to be able to transmit. Streams buy capacity from each of the nodes on their paths, thus streams that cross the same region compete directly for the bandwidth in that region. Prices are adjusted incrementally on both levels.

Publisher
p. 5
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-22274 (URN)
Conference
7th Scandinavian Workshop on Wireless Ad-hoc & Sensor Networks (ADHOC'07), 2-3 May 2007, Stockholm, Sweden
Projects
LIBRA
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-06-08Bibliographically approved
Linnarsson, S., Lönnerberg, P., Olden, M., Aurell, E., Carlsson, M., Ekman, J., . . . Rasmusson, L. (2003). METHODS FOR PROFILING MOLECULES WITH AN OBJECTIVE FUNCTION (18ed.). .
Open this publication in new window or tab >>METHODS FOR PROFILING MOLECULES WITH AN OBJECTIVE FUNCTION
Show others...
2003 (English)Patent (Other (popular science, discussion, etc.))
Abstract [en]

Methods relating to profiling and/or identifying molecules in a sample, particularly chemical or biological molecules contained in an experimental sample using measured data about molecules actually present and known information about candidate molecules that may be present. Information tags can be assigned to candidates. This may be achieved with a high degree of accuracy and a low false positive rate by minimising the effect of one or more possible sources of error. An objective goal (assignment) may be optimised by linear programming or by mixed integer programming

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-23634 (URN)
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6173-599x

Search in DiVA

Show all publications