Essays about: "linux kernel"
Showing result 1 - 5 of 61 essays containing the words linux kernel.
-
1. Towards Performance Evaluation and Future Applications of eBPF
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Extended Berkeley Packet Filter (eBPF) is an instruction set and an execution environment inside the Linux kernel. eBPF improves flexibility for data processing and is realized via a virtual machine featuring both a Just-In-Time (JIT) compiler and an interpreter running in the kernel. READ MORE
-
2. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE
-
3. Analyzing the Performance of Linux Networking Approaches for Packet Processing : A Comparative Analysis of DPDK, io_uring and the standard Linux network stack
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : This thesis investigates the network performance of DPDK, io_uring, and the standard Linux network stack in terms of latency, packet loss, throughput, and packet rate. DPDK is widely adopted in the telecommunication industry and has been for several years. READ MORE
-
4. FPGA accelerated packet capture with eBPF : Performance considerations of using SoC FPGA accelerators for packet capturing.
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of the Internet of Things and the proliferation of embedded devices equipped with an accelerator arose a need for efficient resource utilization. Hardware acceleration is a complex topic that requires specialized domain knowledge about the platform and different trade-offs that have to be made, especially in the area of power consumption. READ MORE
-
5. Runtime Detection of use of Vulnerable Code with a Fine-Grained Resolution
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : We as a society are becoming increasingly dependent on software-based solutions for critical infrastructure. As this dependence grows, so does the opportunities for malicious actors to exploit vulnerabilities which now pose real risks to society and human life. READ MORE