csgy6233-project

Code to support the NYU Operating Systems Course project.

https://github.com/fonyi/csgy6233-project

Science Score: 44.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
    Found CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (6.7%) to scientific vocabulary
Last synced: 6 months ago · JSON representation ·

Repository

Code to support the NYU Operating Systems Course project.

Basic Info
  • Host: GitHub
  • Owner: fonyi
  • License: unlicense
  • Language: C
  • Default Branch: main
  • Size: 6.68 MB
Statistics
  • Stars: 0
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 0
Created over 4 years ago · Last pushed over 3 years ago
Metadata Files
Readme License Citation

README.md

CSGY6233-Project

The discovery of the Meltdown and Spectre vulnerabilities in most modern processors has been detrimental to the reliability of the security of these hardware components. The current workarounds to these vulnerabilities involve operating system (OS) patches and the use of special bound-checking functions for implementation in software programs that run on the systems. Spectre, being a physical flaw in the way processors handle speculative processing, is much harder to patch via software and can only be fully rectified using hardware solutions. There has been research into comparing results from desktop and server systems pre-patch and post-patch, but not a lot of attention on the internet of things (IOT) devices and how those are being secured along with the effect of the patches on performance. Many IOT devices run on ARM processors, which are vulnerable to Spectre. It has been discovered that there is performance degradation on systems with these workarounds and the same is true for IOT devices. This research uses an emulated ARM processor that is utilized in many IOT platforms and which is vulnerable, in order to test the performance of the device both pre-patch and post-patch and verify if the performance degradation is similar in this class of devices. This will demonstrate how difficult it can be to patch a large number of mostly unmanaged devices and what the effects of the patch can have on deterring vendors and users from patching these devices, thus perpetuating the cycle of insecure IOT devices.

Owner

  • Name: Shane Fonyi
  • Login: fonyi
  • Kind: user
  • Location: New York, USA

NYU Cyber Fellow

Citation (CITATION.cff)

# YAML 1.2
---
authors: 
  -
    affiliation: "New York University"
    family-names: Fonyi
    given-names: Shane
cff-version: "1.1.0"
date-released: 2021-08-01
license: "The Unlicense"
message: "For quick and easy reference"
repository-code: "https://github.com/fonyi/CSGY6233-Project"
title: "CS-GY6233 System Benchmark Tool"
version: "0.0.1"
...

GitHub Events

Total
Last Year