Spelling suggestions: "subject:"intel"" "subject:"entel""
31 |
Análise dos caminhos de execução de programas para a paralelização automática de códigos binários para a plataforma Intel x86 / Analysis of the execution paths of programs to perform automatic parallelization of binary codes on the platform Intel x86André Mantini Eberle 06 October 2015 (has links)
Aplicações têm tradicionalmente utilizado o paradigma de programação sequencial. Com a recente expansão da computação paralela, em particular os processadores multinúcleo e ambientes distribuídos, esse paradigma tornou-se um obstáculo para a utilização dos recursos disponíveis nesses sistemas, uma vez que a maior parte das aplicações tornam-se restrita à execução sobre um único núcleo de processamento. Nesse sentido, este trabalho de mestrado introduz uma abordagem para paralelizar programas sequenciais de forma automática e transparente, diretamente sobre o código-binário, de forma a melhor utilizar os recursos disponíveis em computadores multinúcleo. A abordagem consiste na desmontagem (disassembly) de aplicações Intel x86 e sua posterior tradução para uma linguagem intermediária. Em seguida, são produzidos grafos de fluxo e dependências, os quais são utilizados como base para o particionamento das aplicações em unidades paralelas. Por fim, a aplicação é remontada (assembly) e traduzida novamente para a arquitetura original. Essa abordagem permite a paralelização de aplicações sem a necessidade de esforço suplementar por parte de desenvolvedores e usuários. / Traditionally, computer programs have been developed using the sequential programming paradigm. With the advent of parallel computing systems, such as multi-core processors and distributed environments, the sequential paradigm became a barrier to the utilization of the available resources, since the program is restricted to a single processing unit. To address this issue, we introduce a transparent automatic parallelization methodology using a binary rewriter. The steps involved in our approach are: the disassembly of an Intel x86 application, transforming it into an intermediary language; analysis of this intermediary code to obtain flow and dependency graphs; partitioning of the application into parallel units, using the obtained graphs and posterior reassembly of the application, writing it back to the original Intel x86 architecture. By transforming the compiled application software, we aim at obtaining a program which can explore the parallel resources, with no extra effort required either from users or developers.
|
32 |
Formas contemporâneas de relação entre capital e tecnicidade : estudo sobre a gênese de microprocessadores de licença proprietária e livre / Contemporary forms of relationship between capital and technicality : study about the genesis of microprocessors of proprietary and free licenseSchiavetto Amancio, Stefano, 1987- 26 August 2018 (has links)
Orientador: Pedro Peixoto Ferreira / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciências Humanas / Made available in DSpace on 2018-08-26T09:27:12Z (GMT). No. of bitstreams: 1
SchiavettoAmancio_Stefano_M.pdf: 3408621 bytes, checksum: 462b8936b10e3367afd245c41299f6b6 (MD5)
Previous issue date: 2014 / Resumo: O objeto desta dissertação consiste no estudo da relação entre tecnicidade e capital a partir da concretização dos microprocessadores da empresa Intel, no período 1971-1999, e dos microprocessadores da comunidade de hardware livre OpenCores, no período 1999-2013, e como essas têm convertido tais objetos técnicos em capital. Compara-se, de um lado, como a empresa Intel têm registrado seus microprocessadores em licenças proprietárias e investido numa indústria internacional para comercialização de microcomputadores de conhecimento técnico restrito às empresas inventoras. De outro lado, como a comunidade OpenCores têm registrado seus microprocessadores em licenças livres e participado de um movimento internacional que disponibiliza integralmente o conhecimento técnico e gera capital a partir da prestação de serviços de montagem e manutenção em microcomputadores. Como referenciais teóricos para compreensão dos conceitos de tecnicidade e de capital, das formas de trabalho e da geração de valor, são estudadas as obras Do Modo de Existência dos Objetos Técnicos, de Simondon, e O Capital, de Marx. / Abstract: The object of this dissertation is the study of the relationship between technicality and capital from the Intel's development of microprocessors, in the period 1971-1999, and the Open Cores' development of microprocessor, in the period 1999-2013 ¿ the first a worldwide company, the second an international community of free hardware ¿ and how both had converted such technical objects in capital. It is compared, on one side, how Intel has registered its microprocessors in proprietary licenses and invested in an international microcomputer industry, in which technical knowledge is restricted to inventors companies. On the other hand, how the community OpenCores has registered its microprocessors in free licenses and participated of an international movement that offers full technical knowledge at the same time while generates capital by providing installation and maintenance services in microcomputers. Finally, here, as reference for theoretical understanding of the concepts of technicality and capital, the kinds of labor and value generation, are studied the work of Simondon, The Mode of Existence of Technical Objects, and the work of Marx, The Capital / Mestrado / Sociologia / Mestre em Sociologia
|
33 |
TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGXLi, Jiatong January 2019 (has links)
Nowadays cloud computing systems handle large amounts of data and process this data across different systems. It is essential to considering data security vulnerabilities and data protection. One means of decreasing security vulnerabilities is to partition the code into distinct modules and then isolate the execution of the code together with its data. Intel’s Software Guard Extension (SGX) provides security critical code isolation in an enclave. By isolating the code’s execution from an untrusted zone (an unprotected user platform), code integrity and confidentiality are ensured. Transport Layer Security (TLS) is responsible for providing integrity and confidentiality for communication between two entities. Several TLS libraries support cryptographic functions both for an untrusted zone and an enclave. Different TLS libraries have different performance when used with Intel’s SGX. It is desirable to use the best performance TLS library for specific cryptographic functions. This thesis describes a performance evaluation several popular TLS libraries performance on Intel SGX. Using the evaluation results and combining several different TLS libraries together, the thesis proposes a new solution to improve the performance of TLS libraries on Intel SGX. The performance is best when invoking the best specific TLS library based upon the data size – as there is a crossover in performance between the two best libraries. This solution also maintains the versatility of the existing cryptographic functions. / Numera hanterar molnberäkningssystem stora mängder data och bearbetar dessa data över olika system. Det är viktigt att ta itu med datasäkerhetsproblem och dataskydd. Ett sätt att minska säkerhetsproblem är att partitionera koden i olika moduler och sedan isolera kodens exekvering tillsammans med dess data. Intel’s Software Guard Extension (SGX) tillhandahåller säkerhetskritisk kodisolering i en enklav. Genom att isolera kodens körning från en otillförlitlig zon (en oskyddad användarplattform) säkerställs kodintegritet och sekretess. Transport Layer Security (TLS) ansvarar för att ge integritet och konfidentialitet för kommunikation mellan två enheter. Flera TLS-bibliotek stödjer kryptografiska funktioner både för en osäker zon och en enklav. Olika TLS-bibliotek har olika prestanda när de används med Intel’s SGX. Det är önskvärt att använda TLS-bibliotekets bästa prestanda för specifika kryptografiska funktioner. Denna avhandling beskriver en prestationsutvärdering av flera populära TLS-bibliotekens prestanda på Intel SGX. Genom att använda utvärderingsresultaten och kombinera flera olika TLS-bibliotek tillsammans, presenterar avhandlingen en ny design och lösning för att förbättra prestanda för TLS-bibliotek på Intel SGX. Den resulterande prestanda åberopar TLS-bibliotekets bästa prestanda inom en viss datastorlek samtidigt som krypteringsfunktionerna är mångsidiga.
|
34 |
Selective Core Boosting: The Return of the Turbo ButtonWamhoff, Jons-Tobias, Diestelhorst, Stephan, Fetzer, Christof, Marlier, Patrick, Felber, Pascal, Dice, Dave 26 November 2013 (has links) (PDF)
Several modern multi-core architectures support the dynamic control of the CPU's clock rate, allowing processor cores to temporarily operate at speeds exceeding the operational base frequency. Conversely, cores can operate at a lower speed or be disabled altogether to save power. Such facilities are notably provided by Intel's Turbo Boost and AMD's Turbo CORE technologies. Frequency control is typically driven by the operating system which requests changes to the performance state of the processor based on the current load of the system.
In this paper, we investigate the use of dynamic frequency scaling from user space to speed up multi-threaded applications that must occasionally execute time-critical tasks or to solve problems that have heterogeneous computing requirements. We propose a general-purpose library that allows selective control of the frequency of the cores - subject to the limitations of the target architecture. We analyze the performance trade-offs and illustrate its benefits using several benchmarks and real-world workloads when temporarily boosting selected cores executing time-critical operations. While our study primarily focuses on AMD's architecture, we also provide a comparative evaluation of the features, limitations, and runtime overheads of both Turbo Boost and Turbo CORE technologies. Our results show that we can successful exploit these new hardware facilities to
accelerate the execution of key sections of code (critical paths) improving overall performance of some multi-threaded applications. Unlike prior research, we focus on performance instead of power conservation. Our results further can give guidelines for the design of hardware power management facilities and the operating system interfaces to those facilities.
|
35 |
Sistema para aquisição de sinais de tensão e corrente utilizando a plataforma BEAGLEBONE BLACK.Padilha, Celso Machado Maia 27 November 2015 (has links)
Submitted by Morgana Silva (morgana_linhares@yahoo.com.br) on 2016-07-26T17:16:36Z
No. of bitstreams: 1
arquivototal.pdf: 3263751 bytes, checksum: 7ac8739b55aa723353d94f530579f4fc (MD5) / Made available in DSpace on 2016-07-26T17:16:36Z (GMT). No. of bitstreams: 1
arquivototal.pdf: 3263751 bytes, checksum: 7ac8739b55aa723353d94f530579f4fc (MD5)
Previous issue date: 2015-11-27 / Conselho Nacional de Pesquisa e Desenvolvimento Científico e Tecnológico - CNPq / In the current global scenario, the power sector crisis is evident, and to maintain an economic development compatible with this growth, many countries are investing in energy production from many different sources, renewable and clean or not, to supply the growing demand. The integration of these new energy sources demands realtime coordination. Thus, monitoring units need to be reliable besides a good processing and data transmission are needed. In this paper it’s proposed to implement a data acquisition system for current and voltage signals with a low cost embedded platform, focused in hardware programation coupled with the acquisition and conditioning module to apply a Smart Grid concept.This system are responsible for performing analysis of voltage and current provided from electrical grid and transform these informations to readable informations for embedded platform, making possible manipulate this informations from surpevisory systems. With these data, the supervisory systems can analyze and make decisions based on information provided by the platform and use to apply in different concepts present in Smart Grid, such as energy flow control, minimizing the effects of electricity lack, design of distributed generation from renewable sources, identification of energy theft, reduction of technical losses, power monitoring and others. To develop this system was used a Beaglebone Black© development platform, associated with a module for conditioning unit of voltage and current signals, that module was developed by the Optimization Lab Power Systems program (LOSE) of the Electrical Engineering Department (DEE) from Federal University of Paraíba (UFPB). This module is responsible for conditioning the signal voltage and current supplied by the power grid adapting them to the specifications required for reading and conversion in Beaglebone Black© development platform. / No atual cenário mundial, a crise do setor elétrico está cada vez mais evidente, e para se manter um nível de desenvolvimento econômico compatível com este crescimento, muitos países estão investindo no aumento da produção de energia elétrica a partir de diversas fontes, sejam estas renováveis e limpas ou não, para suprir a crescente demanda. A integração dessas novas fontes de energia demanda coordenação em tempo real. Desta forma, unidades confiáveis de monitoramento, processamento e transmissão de dados são necessárias. Neste trabalho propõe-se a implementação de um sistema para aquisição de dados para sinais de tensão e corrente, por meio de uma plataforma de desenvolvimento embarcado de baixo custo associado com foco na programação de hardware, aliado a um módulo de aquisição e condicionamento de sinais para aplicação do conceito de Redes Elétricas Inteligentes - REI (do inglês Smart Grid). O sistema é responsável por realizar a leitura da tensão e da corrente fornecidos pela rede elétrica e transformar-los para informações analisáveis pela plataforma de desenvolvimento, possibilitando assim, a manipulação por sistemas supervisórios. Em posse destes dados, os sistemas supervisórios podem, além de analisar, tomar decisões baseadas nas informações fornecidas pela plataforma e utilizar-las para aplicar em diversos conceitos presentes nas REIs, tais como controle do fluxo de energia, minimização dos efeitos da falta da energia elétrica, concepção de geração distribuída a partir de fontes renováveis, identificação de furtos de energia, redução de perdas técnicas, monitoramento da qualidade de energia e outros. Para o desenvolvimento deste sistema foi utilizado a plataforma de desenvolvimento Beaglebone Black©, associada a uma unidade de condicionamento de sinais de tensão e corrente desenvolvido pelo Progama de Pós-Graduação em Engenharia Elétrica no Laboratório de Otimização de Sistemas de Energia (LOSE) do Departamento de Engenharia Elétrica (DEE), da Universidade Federal da Paraíba (UFPB). Este módulo é reponsável por condicionar os sinais de tensão e corrente fornecidos pela rede elétrica adequando-os às especificações necessárias para leitura e conversão na plataforma de desenvolvimento Beaglebone Black©.
|
36 |
Confidential Computing in Public Clouds : Confidential Data Translations in hardware-based TEEs: Intel SGX with Occlum supportYulianti, Sri January 2021 (has links)
As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalable, and secure marketplace for collaborative data creation, analysis, and exchange among enterprises. Security is a prominent research challenge in this context, with a specific question on how two mutually distrusting data owners can share their data. Confidential Computing helps address this question by allowing to perform data computation inside hardware-based Trusted Execution Environments (TEEs) which we refer to as enclaves, a secured memory that is allocated by CPU. Examples of hardware-based TEEs are Advanced Micro Devices (AMD)-Secure Encrypted Virtualization (SEV), Intel Software Guard Extensions (SGX) and Intel Trust Domain Extensions (TDX). Intel SGX is considered as the most popular hardware-based TEEs since it is widely available in processors targeting desktop and server platforms. Intel SGX can be programmed using Software Development Kit (SDK) as development framework and Library Operating Systems (Library OSes) as runtimes. However, communication with software in the enclave such as the Library OS through system calls may result in performance overhead. In this project, we design confidential data transactions among multiple users, using Intel SGX as TEE hardware and Occlum as Library OS. We implement the design by allowing two clients as data owners share their data to a server that owns Intel SGX capable platform. On the server side, we run machine learning model inference with inputs from both clients inside an enclave. In this case, we aim to evaluate Occlum as a memory-safe Library Operating System (OS) that enables secure and efficient multitasking on Intel SGX by measuring two evaluation aspects such as performance overhead and security benefits. To evaluate the measurement results, we compare Occlum with other runtimes: baseline Linux and Graphene-SGX. The evaluation results show that our design with Occlum outperforms Graphene-SGX by 4x in terms of performance. To evaluate the security aspects, we propose 11 threat scenarios potentially launched by both internal and external attackers toward the design in SGX platform. The results show that Occlum security features succeed to mitigate 10 threat scenarios out of 11 scenarios overall. / När företag migrerar sin data till molninfrastruktur behöver de i allt högre grad en flexibel, skalbar och säker marknadsplats för gemensam dataskapande, analys och utbyte mellan företag. Säkerhet är en framstående forskningsutmaning i detta sammanhang, med en specifik fråga om hur två ömsesidigt misstroende dataägare kan dela sina data. Confidential Computing hjälper till att ta itu med den här frågan genom att tillåta att utföra databeräkning i hårdvarubaserad TEEs som vi kallar enklaver, ett säkert minne som allokeras av CPU. Exempel på maskinvarubaserad TEEs är AMD-SEV, Intel SGX och Intel TDX. Intel SGX anses vara den mest populära maskinvarubaserade TEEs eftersom det finns allmänt tillgängligt i processorer som riktar sig mot stationära och serverplattformar. Intel SGX kan programmeras med hjälp av SDK som utvecklingsram och Library Operating System (Library OSes) som körtid. Kommunikation med programvara i enklaven, till exempel Library OS via systemanrop, kan dock leda till prestandakostnader. I det här projektet utformar vi konfidentiella datatransaktioner mellan flera användare, med Intel SGX som TEE-hårdvara och Occlum som Library OS. Vi implementerar designen genom att låta två klienter som dataägare dela sina data till en server som äger Intel SGX-kompatibel plattform. På serversidan kör vi maskininlärningsmodell slutsats med ingångar från båda klienterna i en enklav. I det här fallet strävar vi efter att utvärdera Occlum som ett minnessäkert Library OS som möjliggör säker och effektiv multitasking på Intel SGX genom att mäta två utvärderingsaspekter som prestandakostnader och säkerhetsfördelar. För att utvärdera mätresultaten jämför vi Occlum med andra driftstider: baslinjen Linux och Graphene-SGX. Utvärderingsresultaten visar att vår design med Occlum överträffar Graphene-SGX av 4x när det gäller prestanda. För att utvärdera säkerhetsaspekterna föreslår vi elva hotscenarier som potentiellt lanseras av både interna och externa angripare mot designen i SGX-plattformen. Resultaten visar att Occlums säkerhetsfunktioner lyckas mildra 10 hotscenarier av 11 scenarier totalt.
|
37 |
Systems Support for Trusted Execution EnvironmentsTrach, Bohdan 09 February 2022 (has links)
Cloud computing has become a default choice for data processing by both large corporations and individuals due to its economy of scale and ease of system management. However, the question of trust and trustoworthy computing inside the Cloud environments has been long neglected in practice and further exacerbated by the proliferation of AI and its use for processing of sensitive user data. Attempts to implement the mechanisms for trustworthy computing in the cloud have previously remained theoretical due to lack of hardware primitives in the commodity CPUs, while a combination of Secure Boot, TPMs, and virtualization has seen only limited adoption. The situation has changed in 2016, when Intel introduced the Software Guard Extensions (SGX) and its enclaves to the x86 ISA CPUs: for the first time, it became possible to build trustworthy applications relying on a commonly available technology. However, Intel SGX posed challenges to the practitioners who discovered the limitations of this technology, from the limited support of legacy applications and integration of SGX enclaves into the existing system, to the performance bottlenecks on communication, startup, and memory utilization. In this thesis, our goal is enable trustworthy computing in the cloud by relying on the imperfect SGX promitives. To this end, we develop and evaluate solutions to issues stemming from limited systems support of Intel SGX: we investigate the mechanisms for runtime support of POSIX applications with SCONE, an efficient SGX runtime library developed with performance limitations of SGX in mind. We further develop this topic with FFQ, which is a concurrent queue for SCONE's asynchronous system call interface. ShieldBox is our study of interplay of kernel bypass and trusted execution technologies for NFV, which also tackles the problem of low-latency clocks inside enclave. The two last systems, Clemmys and T-Lease are built on a more recent SGXv2 ISA extension. In Clemmys, SGXv2 allows us to significantly reduce the startup time of SGX-enabled functions inside a Function-as-a-Service platform. Finally, in T-Lease we solve the problem of trusted time by introducing a trusted lease primitive for distributed systems. We perform evaluation of all of these systems and prove that they can be practically utilized in existing systems with minimal overhead, and can be combined with both legacy systems and other SGX-based solutions. In the course of the thesis, we enable trusted computing for individual applications, high-performance network functions, and distributed computing framework, making a <vision of trusted cloud computing a reality.
|
38 |
Evaluating hardware isolation for secure software development in Highly Regulated Environments / Utvärdering av hårdvaruisolering för säker programvaruutveckling i mycket reglerade miljöerBrogärd, Andre January 2023 (has links)
Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. Specifically, this work analyzes the extent to which the Intel SGX can guarantee the integrity and authenticity of software produced in Highly Regulated Environments. A theoretical evaluation using assurance cases shows that a hardware isolation approach has the potential to guarantee the integrity and authenticity of the produced software. Security weaknesses in Intel SGX significantly limit the confidence in its ability to secure the build environment. Directions for future work to secure a build environment with a hardware isolation approach are suggested. Most importantly, the guarantees from hardware isolation should be improved, suggestively by choosing a more secure hardware isolation solution, and a proof-of-concept of the approach should be implemented. / Organisationer i mycket reglerade industrier har ett ökat behov av att skydda sina intellektuella tillgångar, eftersom avancerade långvariga hot (APT) har förmågan att använda sig av distributionskedjeattacker för att ta sig förbi existerande skydd. Det här arbetet undersöker möjligheten att skydda sig mot distributionskedjeattacker genom att isolera mjukvarans byggmiljö med hjälp av hårdvaruisolering. Specifikt analyseras till vilken grad Intel SGX kan garantera integriteten och autenticiteten av mjukvara som produceras i mycket reglerade miljöer. En teoretisk evaluering genom assurans visar att hårdvaruisolering har möjligheten att garantera integriteten och autenticiteten hos den producerade mjukvaran. Säkerhetsbrister i Intel SGX begränsar i hög grad förtroendet för dess förmåga att säkra byggmiljön. För vidare forskning föreslås att garantierna från hårdvaruisolering förbättras, förslagsvis genom att välja säkrare hårdvaruisoleringslösningar, samt att en prototyp av lösningen implementeras.
|
39 |
Reorganization on employee satisfaction: The gray area of corporations : A case study on Intel Corporation’s employeesKarayianni, Fotini January 2019 (has links)
The present thesis exploits a concept that lays in the core of human capital, employee satisfaction, under the context of a proactive organizational change. The prior literature depicts organizational change as a strategy applied to increase the efficiency of the company and its relevance to the market involved. The unique element of the matter is that proactive reorganizations are a product of a structural practice initiated by an entity’s human resources department. The department operates under a standardized model of change, which focuses on addressing the technical discrepancies that may occur in the human capital. Mainly analyzed from a company’s perspective, its influence on the employees involved in the change is often been neglected. The thesis was conducted in an effort to assess the need for a change in the current model in order to better address employee’s needs. To achieve that a sample of 100 Intel employees was used to uncover the state of the employees’ job satisfaction after an organizational change has been taken place. Results of the analysis exhibited above average overall satisfaction scores. The areas that employees seem to be the least satisfied were that of job security and company’s policies. Moreover, the elements of culture and the type of reorganization have also seemed to influence the overall satisfaction scores. Upon viewing the results the authors concluded that a need does exist, for a more interpersonal human resource approach to be incorporated within the current reorganizational model of an entity.
|
40 |
Věrnostní rabaty jako vylučující praktika v evropském soutěžním právu. / Loyalty Rebates as an Exclusionary Practice in the European Competition Law.Šebo, Igor January 2019 (has links)
1 LOYALTY REBATES AS AN EXCLUSIONARY PRACTISE IN THE EUROPEAN COMPETITION LAW ABSTRACT This master thesis treats loyalty rebates in the light of European competition law when applied by dominant undertakings and analyses its consequences. It describes when such practise might be considered by European Union authorities as an abuse of a dominant position as it has negative impact on the competitors by inducing customer's loyalty to the dominant undertaking. It depicts its position in the European competition law system and compares it to other practises that influence the market in a similar way. Also, it classifies different types of loyalty and other types of rebates and explains how such rebates can force a customer to acquire increasing portions of his demand from the dominant undertaking and how they can damage its competitors. The thesis also offers a critical view on a very strict treatment of this practise by European institutions in the past and it arguments by several positive effects that loyalty and other types of rebates may have. Simultaneously it takes into consideration the newest decision of the Court of Justice of the European Union in the Intel case from September 2017 which will hopefully affect EU institutions' approach to this practise as it broke well-established per se interdiction of...
|
Page generated in 0.103 seconds