scispace - formally typeset
Search or ask a question

Showing papers on "Windows NT published in 2013"


Journal ArticleDOI
TL;DR: Open source security foundations for mobile and embedded devices and how to use them to improve security on the go.
Abstract: To discuss operating system security is to marvel at the diversity of deployed access-control models: Unix and Windows NT multiuser security; Type Enforcement in SELinux; anti-malware products; app...

39 citations


Journal ArticleDOI
Ke Wang1, Ke Wang2, Chengrui Zhang1, Xun Xu2, Ji Shuai1, Lin Yang1 
TL;DR: Real-time Ethernet is introduced and its use in CNC is discussed in this paper, and experimental results are presented to illustrate the Windows NT’s performance and the real-time accuracy of the synchronization method.
Abstract: Modern manufacturing industry requires computer numerical control (CNC) systems to be more open, extendable, and networked. Real-time Ethernet is introduced and its use in CNC is discussed in this paper. Compared to traditional fieldbus, a real-time Ethernet which modifies the Ethernet data link layer to achieve fast delivery time and high synchronization accuracy is discussed. The method of synchronizing distributing clocks to reduce cumulative jitter of transmission for a synchronization frame is proposed. Some special considerations of this real-time Ethernet are discussed, e.g., incorporation with Windows NT and making feedback returned faster. A CNC system based on such a real-time Ethernet and Windows NT has been developed and presented. The system involves the service-oriented Windows Communication Foundation as an up-layer interface to the Internet, and a real-time Ethernet for connecting to hardware components of a machine tool. The non-real-time aspect of Windows NT is accounted for; for example, a driver rewriting the interrupt descriptor table is introduced and packets to be sent are buffered. Design and implementation of this system, such as main classes and services in the NC kernel, main modules (e.g., data link layer) in salve nodes, are also discussed. At last, experimental results are presented to illustrate the Windows NT’s performance and the real-time accuracy of the synchronization method.

22 citations


05 May 2013
TL;DR: The concept of employing CPU-level operating system instrumentation to identify potential instances of local race conditions in fetching user-mode input data within system call handlers and other user-facing ring-0 code is discussed and how it was successfully implemented in the Bochspwn project.
Abstract: The overall security posture of operating systems’ kernels – and specifically the Microsoft Windows NT kernel – against both local and remote attacks has visibly improved throughout the last decade. In our opinion, this is primarily due to the increasing interest in kernel-mode vulnerabilities by both white and black-hat parties, as they ultimately allow attackers to subvert the currently widespread defense-in-depth technologies implemented on operating system level, such as sandboxing, or other features enabling better management of privileges within the execution environment (e.g. Mandatory Integrity Control). As a direct outcome, Microsoft has invested considerable resources in both improving the development process with programs like Secure Development Lifecycle, and explicitly hardening the kernel against existing attacks; the latter was particularly characteristic to Windows 8, which introduced more kernel security improvements than any NT-family system thus far[11]. In this paper, we discuss the concept of employing CPU-level operating system instrumentation to identify potential instances of local race conditions in fetching user-mode input data within system call handlers and other user-facing ring-0 code, and how it was successfully implemented in the Bochspwn project. Further in the document, we present a number of generic techniques easing the exploitation of timing bound kernel vulnerabilities and show how these techniques can be employed in practical attacks against three exemplary vulnerabilities discovered by Bochspwn. In the last sections, we conclusively provide some suggestions on related research areas that haven’t been fully explored and require further development.

21 citations


Posted Content
John S. Breese1, Russ Blake1
TL;DR: An application of belief networks to the diagnosis of bottlenecks in computer systems relies on a high-level functional model of the interaction between application workloads, the Windows NT operating system, and system hardware.
Abstract: We describe an application of belief networks to the diagnosis of bottlenecks in computer systems. The technique relies on a high-level functional model of the interaction between application workloads, the Windows NT operating system, and system hardware. Given a workload description, the model predicts the values of observable system counters available from the Windows NT performance monitoring tool. Uncertainty in workloads, predictions, and counter values are characterized with Gaussian distributions. During diagnostic inference, we use observed performance monitor values to find the most probable assignment to the workload parameters. In this paper we provide some background on automated bottleneck detection, describe the structure of the system model, and discuss empirical procedures for model calibration and verification. Part of the calibration process includes generating a dataset to estimate a multivariate Gaussian error model. Initial results in diagnosing bottlenecks are presented.

17 citations


Journal ArticleDOI
TL;DR: Keyboard filter driver which used Windows NT driver model is completed in DDK developed environment and its convenient for users to view information of keyboard history.
Abstract: Driver is a communicated program between the operating system and hardware. It is the responsibility of handling I/O request packet. Keyboard filter driver which used Windows NT driver model is completed in DDK developed environment. This driver realized filtering and recording key information. Its convenient for users to view information of keyboard history. The design of this driver can also be studied for other Windows drivers.

4 citations


Journal Article
TL;DR: Comparisons between the Microsoft Windows and Linux computer operating systems are a long-running discussion topic within the personal computer industry, with each seeking to improve in their perceived weaker areas of philosophy, cost, versatility and stability.
Abstract: Comparisons between the Microsoft Windows and Linux computer operating systems are a long-running discussion topic within the personal computer industry. Throughout the entire period of the Windows 9x systems through the introduction of Windows 7, Windows has retained an extremely large retail sales majority among operating systems for personal desktop use, while Linux has sustained its status as the most prominent Free Software and Open Source operating system. After their initial clash, both operating systems moved beyond the user base of the personal computer market and share a rivalry on a variety of other devices, with offerings for the server and embedded systems markets, and mobile internet access. Linux and Microsoft Windows differ in philosophy, cost, versatility and stability, with each seeking to improve in their perceived weaker areas. Comparisons of the two operating systems tend to reflect their origins, historic user bases and distribution models.

2 citations


14 Aug 2013
TL;DR: Today Brad Anderson, VP for Window Server & System Center, announced, through a blog post, that on October 18 2013 both Windows Server 2012 R2 and Windows Server 2011 R2 will be retired.
Abstract: Today Brad Anderson, VP for Window Server & System Center, announced, through a blog post, that on October 18 2013 both Windows Server 2012 R2 ...

2 citations


Journal ArticleDOI
TL;DR: To discuss operating system security is to marvel at the diversity of deployed access-control models: Unix and Windows NT multiuser security; Type Enforcement in SELinux; anti-malware products; app sandboxing in Apple OS X, Apple iOS, and Google Android; and application-facing systems such as Capsicum in FreeBSD.
Abstract: To discuss operating system security is to marvel at the diversity of deployed access-control models: Unix and Windows NT multiuser security; Type Enforcement in SELinux; anti-malware products; app sandboxing in Apple OS X, Apple iOS, and Google Android; and application-facing systems such as Capsicum in FreeBSD. This diversity is the result of a stunning transition from the narrow 1990s Unix and NT status quo to ’security localization’ - the adaptation of operating-system security models to site-local or product-specific requirements.

1 citations


Journal ArticleDOI
01 Jan 2013
TL;DR: The paper addresses computer memory management with real-time operation in mind, and two essential memory allocation algorithms are analyzed, Hoard and jemalloc, as well as a default algorithm for each specific platform considered.
Abstract: The paper addresses computer memory management with real-time operation in mind. Two essential memory allocation algorithms are analyzed, Hoard and jemalloc, as well as a default algorithm for each specific platform considered. Benchmarking experiments for four platforms, Mac OS X, Linux, Windows NT, and VxWorks, were conducted and respective data collected and analyzed.

1 citations


03 Jun 2013
TL;DR: During its annual TechEd North America conference held in New Orleans this week Microsoft announced the next versions of Windows Server and System Center until 2020, which will be followed by a series of upgrades to Windows 10.
Abstract: During its annual TechEd North America conference held in New Orleans this week Microsoft announced the next versions of Windows Server and System Center until ...

1 citations


Journal ArticleDOI
TL;DR: The paper through the use of cloud computing, one of the platforms Windows Azure, using its Table Storage storage services, to realize a message board function and explore the Difference of the Microsoft Windows Azure cloud computing platform development and the difference between ordinary ASP.NET development.
Abstract: in order to study the development of the Windows Azure platform, the paper through the use of cloud computing, one of the platforms Windows Azure, using its Table Storage storage services,to realize a message board function; and realize a good combination of NET Framework and Windows Azure, and explore the Difference of the Microsoft Windows Azure cloud computing platform development and the difference between ordinary ASP.NET development.

Journal ArticleDOI
TL;DR: This paper aims at making deep analyses on the principles and features of Services For Unix, Application Programming Interface emulation, virtual machine platform, source codes refactoring, etc.
Abstract: Operating Linux Application softwares on Windows platform, can not only promote the development of interoperability technology of these two operating systems, but also strengthen the status Windows has in the market. Because of the differences in the architectures of Linux and Windows, when running Linux application programs in Windows operating system, we need to resort to some certain kinds of technologies such as Services For Unix, Application Programming Interface emulation, virtual machine platform, source codes refactoring, etc. This paper aims at making deep analyses on the principles and features of these technologies.