WorldCat Identities

Bhatti, Muhammad Khurram

Overview
Works: 9 works in 12 publications in 3 languages and 20 library holdings
Roles: Author, Contributor, Other, Thesis advisor, Opponent
Publication Timeline
.
Most widely held works by Muhammad Khurram Bhatti
Energy-aware scheduling for real-time embedded systems, scheduling for more than temporal correctness by Muhammad Khurram Bhatti( )

3 editions published in 2012 in English and German and held by 5 WorldCat member libraries worldwide

"Real-time embedded systems have become ubiquitous in our daily life. Due to their diversified usage, the research on these systems has confronted with many emerging challenges. One such challenge is to reduce power and energy consumption while maintaining assurance that timing constraints will be met. Power densities in microprocessors are almost doubled every three years. As energy is power integrated over time, supplying the required energy may become prohibitively expensive, or even technologically infeasible. This is particularly difficult in portable systems that heavily rely on batteries for energy, and will become even more critical as battery capacities are increasing at a much slower rate than power consumption. This book presents four contributions that are based on the thesis that energy-efficiency of Real-time Embedded Systems and scheduling are closely related problems and therefore, should be tackled together for optimal results. Contributions of this book are: 1) Two-level Hierarchical Scheduling Algorithm for Multiprocessor Systems, 2) Assertive Dynamic Power Management Scheme, 3) Deterministic Stretch-to-Fit DVFS Technique, and 4) Hybrid Power Management Scheme."
Software-based Detection and Mitigation of Microarchitectural Attacks on Intel's x86 Architecture by Maria Mushtaq( )

1 edition published in 2019 in English and held by 2 WorldCat member libraries worldwide

Access-driven cache-based sidechannel attacks, a sub-category of SCAs, are strong cryptanalysis techniques that break cryptographic algorithms by targeting their implementations. Despite valiant efforts, mitigation techniques against such attacks are not very effective. This is mainly because most mitigation techniques usually protect against any given specific vulnerability and do not take a system-wide approach. Moreover, these solutions either completely remove or greatly reduce the prevailing performance benefits in computing systems that are hard earned over many decades. This thesis presents arguments in favor of enhancing security and privacy in modern computing architectures while retaining the performance benefits. The thesis argues in favor of a need-based protection, which would allow the operating system to apply mitigation only after successful detection of CSCAs. Thus, detection can serve as a first line of defense against such attacks. However, for detection-based protection strategy to be effective, detection needs to be highly accurate, should incur minimum system overhead at run-time, should cover a large set of attacks and should be capable of early stage detection, i.e., before the attack completes. This thesis proposes a complete framework for detection-based protection. At first, the thesis presents a highly accurate, fast and lightweight detection framework to detect a large set of Cache-based SCAs at run-time under variable system load conditions. In the follow up, the thesis demonstrates the use of this detection framework through the proposition of an OS-level run-time detection-based mitigation mechanism for Linux generalpurpose distribution. Though the proposed mitigation mechanism is proposed for Linux general distributions, which is widely used in commodity hardware, the solution is scalable to other operating systems. We provide extensive experiments to validate the proposed detection framework and mitigation mechanism. This thesis demonstrates that security and privacy are system-wide concerns and the mitigation solutions must take a holistic approach
Energy-aware scheduling for multiprocessor real-time systems by Muhammad Khurram Bhatti( Book )

2 editions published in 2011 in French and held by 2 WorldCat member libraries worldwide

Modern real-time applications have become more sophisticated and complex in their behaviour over the time. Contemporaneously, multiprocessor architectures have emerged. Multiprocessor systems, due to their autonomy and reliability, face critical problem of energy consumption. To address this issue in real-time systems, many software-based approaches have emerged. This thesis proposes new techniques for energy-efficient scheduling of multiprocessor systems. Our first contribution is a hierarchical scheduling algorithm that allows restricted migration of tasks. This algorithm aims at reducing the sub-optimality of global EDF algorithm. The second contribution of this thesis is a dynamic power management technique called Assertive Dynamic Power Management (AsDPM). This technique is an admission control technique for real-time tasks, which decides when exactly a ready task shall execute, thereby reducing the number of active processors. The third contribution of this dissertation is a DVFS technique, referred as Deterministic Strech-to-Fit (DSF) technique, which falls in the category of inter-task DVFS techniques. Both DPM and DVFS techniques are efficient for specific operating conditions. However, they often outperform each other when these conditions change. Our fourth and final contribution is a generic power / energy management scheme, called Hybrid Power Management (HyPowMan) scheme. This scheme, instead of designing new power / energy management techniques for specific operating conditions, takes a set of well-known existing policies. At runtime, the best-performing policy for given workload is adapted by HyPowMan scheme through machine-learning approach
Scheduling of Parallel Tasks with Proportionate Priorities by Muhammad Khurram Bhatti( )

1 edition published in 2016 in English and held by 2 WorldCat member libraries worldwide

Locality-aware task scheduling for homogeneous parallel computing systems by Muhammad Khurram Bhatti( )

1 edition published in 2017 in English and held by 2 WorldCat member libraries worldwide

Hybrid power management in real time embedded systems: an interplay of DVFS and DPM techniques by Muhammad Khurram Bhatti( )

1 edition published in 2011 in English and held by 2 WorldCat member libraries worldwide

Effectiveness of power strategies for video applications: a practical study by Sébastien Bilavarn( )

1 edition published in 2014 in English and held by 2 WorldCat member libraries worldwide

Inter-FPGA interconnect topologies exploration for multi-FPGA systems by Umer Farooq( )

1 edition published in 2018 in English and held by 2 WorldCat member libraries worldwide

Spatial Isolation against Logical Cache-based Side-Channel Attacks in Many-Core Architectures by Maria Méndez Real( )

1 edition published in 2017 in English and held by 1 WorldCat member library worldwide

L'évolution technologique ainsi que l'augmentation incessante de la puissance de calcul requise par les applications font des architectures ”many-core” la nouvelle tendance dans la conception des processeurs. Ces architectures sont composées d'un grand nombre de ressources de calcul (des centaines ou davantage) ce qui offre du parallélisme massif et un niveau de performance très élevé. En effet, les architectures many-core permettent d'exécuter en parallèle un grand nombre d'applications, venant d'origines diverses et de niveaux de sensibilité et de confiance différents, tout en partageant des ressources physiques telles que des ressources de calcul, de mémoire et de communication. Cependant, ce partage de ressources introduit également des vulnérabilités importantes en termes de sécurité. En particulier, les applications sensibles partageant des mémoires cache avec d'autres applications, potentiellement malveillantes, sont vulnérables à des attaques logiques de type canaux cachés basées sur le cache. Ces attaques, permettent à des applications non privilégiées d'accéder à des informations secrètes sensibles appartenant à d'autres applications et cela malgré des méthodes de partitionnement existantes telles que la protection de la mémoire et la virtualisation. Alors que d'importants efforts ont été faits afin de développer des contremesures à ces attaques sur des architectures multicoeurs, ces solutions n'ont pas été originellement conçues pour des architectures many-core récemment apparues et nécessitent d'être évaluées et/ou revisitées afin d'être applicables et efficaces pour ces nouvelles technologies. Dans ce travail de thèse, nous proposons d'étendre les services du système d'exploitation avec des mécanismes de déploiement d'applications et d'allocation de ressources afin de protéger les applications s'exécutant sur des architectures many-core contre les attaques logiques basées sur le cache. Plusieurs stratégies de déploiement sont proposées et comparées à travers différents indicateurs de performance. Ces contributions ont été implémentées et évaluées par prototypage virtuel basé sur SystemC et sur la technologie ”Open Virtual Platforms” (OVP)
 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.91 (from 0.81 for Energy-awa ... to 0.97 for Energy-awa ...)

WorldCat IdentitiesRelated Identities
Energy-aware scheduling for real-time embedded systems, scheduling for more than temporal correctness
Covers
Languages