E. Confalonieri, P. Amato, D. Balluchi, D. Caraccio, M. Dallabora
{"title":"Mobile Memory Systems","authors":"E. Confalonieri, P. Amato, D. Balluchi, D. Caraccio, M. Dallabora","doi":"10.1109/MST.2015.14","DOIUrl":"https://doi.org/10.1109/MST.2015.14","url":null,"abstract":"The mobile market will continue to drive the memory industry in the up-coming years, with the highest growth for both system memory and storage. It is expected that handsets and tablets will represent more than 40% of DRAM and NANDindustry bit demand in 2018. The evolution from feature phones to smartphones and tablets imposed a steady improvement to memory system in terms of interfaces, performances and features, to address the challenging requirements of new applications.After a brief description of smartphone architecture, this paper summarizes features and characteristics of the memory devices in today's mobile systems describing their evolution in the recent years. Furthermore, it illustrates usage models and typical workloads measured in smartphones. Some relevant use cases where the memory system plays a fundamental role for the user experience are described, including high resolution photo and video, and gaming.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of the BFQ Storage-I/O Scheduler","authors":"P. Valente, Arianna Avanzini","doi":"10.1109/MST.2015.9","DOIUrl":"https://doi.org/10.1109/MST.2015.9","url":null,"abstract":"An accurate storage-I/O scheduler, named Budget Fair Queueing (BFQ), was integrated with a special set of heuristics a few years ago. The resulting, improved scheduler, codenamed BFQ-v1, was able to guarantee a number of desirable service properties, including a high responsiveness, to applications and system services. In the intervening years, BFQ-v1 has become relatively popular on desktop and handheld systems, and has further evolved. But no official, comprehensive and concentrated documentation has been provided about the improvements that have followed each other. In this paper we fill this documentation gap, by describing the current, last version of BFQ (v7r8). We also show the performance of BFQ-v7r8 through some experimental results, in terms of throughput and application responsiveness, and on both an HDD and an SSD.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Management in Battery Powered Handheld Portable Applications","authors":"S. Saggini","doi":"10.1109/MST.2015.13","DOIUrl":"https://doi.org/10.1109/MST.2015.13","url":null,"abstract":"The aim of this paper is to describe the power management system for portable electronics. In the recent years, consumers demand more and more from their mobile devices, including broadband connectivity and leading features such as high-end digital camera functions and HD audio, but one of the most requested features is a longer battery life. Achieving energy efficiency requires significant improvements in the energy usage profile of every system component and a high performance power management system. Other important key features are power density and a low profile of the circuit solution, which can be obtained only with a high frequency converter operation and integration SIP (system in package). In this paper the power management system for portable electronics, from wireless battery charging system to the CPU power management, will be introduced and discussed.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Canfora, Andrea Di Sorbo, F. Mercaldo, C. A. Visaggio
{"title":"Obfuscation Techniques against Signature-Based Detection: A Case Study","authors":"G. Canfora, Andrea Di Sorbo, F. Mercaldo, C. A. Visaggio","doi":"10.1109/MST.2015.8","DOIUrl":"https://doi.org/10.1109/MST.2015.8","url":null,"abstract":"Android malware is increasingly growing interms of complexity. In order to evade signature-based detection, which represents the most adopted technique by current antimalware vendors, malware writers begin to deploy malware with the ability to change their code as they propagate.In this paper, our aim is to evaluate the robustness of Android antimalware tools when various evasion techniques are used to obfuscate malicious payloads. To support this assessment we realized a tool which applies a number of common transformations on the code of malware applications, and applied these transformations to about 5000 malware apps. Our results demonstrate that, after the code transformations, the malware is not detected by a large set of antimalware tools,even when, before applying the transformations, malware was correctly identified by most antimalware tools. Such outcomes suggest that malware detection methods must be quickly re-designed for protecting successfully smart devices.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges for Hardware Designers of Mobile Systems","authors":"Jelena Milosevic, A. Ferrante, F. Regazzoni","doi":"10.1109/MST.2015.11","DOIUrl":"https://doi.org/10.1109/MST.2015.11","url":null,"abstract":"Mobile devices have been pervading many aspects of our lives, including applications that are critical and deal with sensitive data. Together with existing features, designers are required to add cryptographic primitives capable of guaranteeing privacy of the users and security of the operations. However, for pervasive mobile devices, the simple addition of cryptographic capabilities is not sufficient.In this paper, we discuss, from the hardware prospective,three main security challenges faced by designers while designing mobile devices: physical attacks, hardware Trojans, and software malware. For the first ones, we report mitigation techniques which can be already applied during the hardware design flow. For the last one, which is mainly related to software, we discuss its potential hardware implications.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}