2015 Mobile Systems Technologies Workshop (MST)最新文献

筛选
英文 中文
Mobile Memory Systems 移动存储系统
2015 Mobile Systems Technologies Workshop (MST) Pub Date : 2015-05-22 DOI: 10.1109/MST.2015.14
E. Confalonieri, P. Amato, D. Balluchi, D. Caraccio, M. Dallabora
{"title":"Mobile Memory Systems","authors":"E. Confalonieri, P. Amato, D. Balluchi, D. Caraccio, M. Dallabora","doi":"10.1109/MST.2015.14","DOIUrl":"https://doi.org/10.1109/MST.2015.14","url":null,"abstract":"The mobile market will continue to drive the memory industry in the up-coming years, with the highest growth for both system memory and storage. It is expected that handsets and tablets will represent more than 40% of DRAM and NANDindustry bit demand in 2018. The evolution from feature phones to smartphones and tablets imposed a steady improvement to memory system in terms of interfaces, performances and features, to address the challenging requirements of new applications.After a brief description of smartphone architecture, this paper summarizes features and characteristics of the memory devices in today's mobile systems describing their evolution in the recent years. Furthermore, it illustrates usage models and typical workloads measured in smartphones. Some relevant use cases where the memory system plays a fundamental role for the user experience are described, including high resolution photo and video, and gaming.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evolution of the BFQ Storage-I/O Scheduler BFQ存储i /O调度器的演变
2015 Mobile Systems Technologies Workshop (MST) Pub Date : 2015-05-22 DOI: 10.1109/MST.2015.9
P. Valente, Arianna Avanzini
{"title":"Evolution of the BFQ Storage-I/O Scheduler","authors":"P. Valente, Arianna Avanzini","doi":"10.1109/MST.2015.9","DOIUrl":"https://doi.org/10.1109/MST.2015.9","url":null,"abstract":"An accurate storage-I/O scheduler, named Budget Fair Queueing (BFQ), was integrated with a special set of heuristics a few years ago. The resulting, improved scheduler, codenamed BFQ-v1, was able to guarantee a number of desirable service properties, including a high responsiveness, to applications and system services. In the intervening years, BFQ-v1 has become relatively popular on desktop and handheld systems, and has further evolved. But no official, comprehensive and concentrated documentation has been provided about the improvements that have followed each other. In this paper we fill this documentation gap, by describing the current, last version of BFQ (v7r8). We also show the performance of BFQ-v7r8 through some experimental results, in terms of throughput and application responsiveness, and on both an HDD and an SSD.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Power Management in Battery Powered Handheld Portable Applications 电池供电手持便携应用的电源管理
2015 Mobile Systems Technologies Workshop (MST) Pub Date : 2015-05-22 DOI: 10.1109/MST.2015.13
S. Saggini
{"title":"Power Management in Battery Powered Handheld Portable Applications","authors":"S. Saggini","doi":"10.1109/MST.2015.13","DOIUrl":"https://doi.org/10.1109/MST.2015.13","url":null,"abstract":"The aim of this paper is to describe the power management system for portable electronics. In the recent years, consumers demand more and more from their mobile devices, including broadband connectivity and leading features such as high-end digital camera functions and HD audio, but one of the most requested features is a longer battery life. Achieving energy efficiency requires significant improvements in the energy usage profile of every system component and a high performance power management system. Other important key features are power density and a low profile of the circuit solution, which can be obtained only with a high frequency converter operation and integration SIP (system in package). In this paper the power management system for portable electronics, from wireless battery charging system to the CPU power management, will be introduced and discussed.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obfuscation Techniques against Signature-Based Detection: A Case Study 针对基于签名的检测的混淆技术:一个案例研究
2015 Mobile Systems Technologies Workshop (MST) Pub Date : 2015-05-22 DOI: 10.1109/MST.2015.8
G. Canfora, Andrea Di Sorbo, F. Mercaldo, C. A. Visaggio
{"title":"Obfuscation Techniques against Signature-Based Detection: A Case Study","authors":"G. Canfora, Andrea Di Sorbo, F. Mercaldo, C. A. Visaggio","doi":"10.1109/MST.2015.8","DOIUrl":"https://doi.org/10.1109/MST.2015.8","url":null,"abstract":"Android malware is increasingly growing interms of complexity. In order to evade signature-based detection, which represents the most adopted technique by current antimalware vendors, malware writers begin to deploy malware with the ability to change their code as they propagate.In this paper, our aim is to evaluate the robustness of Android antimalware tools when various evasion techniques are used to obfuscate malicious payloads. To support this assessment we realized a tool which applies a number of common transformations on the code of malware applications, and applied these transformations to about 5000 malware apps. Our results demonstrate that, after the code transformations, the malware is not detected by a large set of antimalware tools,even when, before applying the transformations, malware was correctly identified by most antimalware tools. Such outcomes suggest that malware detection methods must be quickly re-designed for protecting successfully smart devices.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Security Challenges for Hardware Designers of Mobile Systems 移动系统硬件设计者面临的安全挑战
2015 Mobile Systems Technologies Workshop (MST) Pub Date : 2015-05-22 DOI: 10.1109/MST.2015.11
Jelena Milosevic, A. Ferrante, F. Regazzoni
{"title":"Security Challenges for Hardware Designers of Mobile Systems","authors":"Jelena Milosevic, A. Ferrante, F. Regazzoni","doi":"10.1109/MST.2015.11","DOIUrl":"https://doi.org/10.1109/MST.2015.11","url":null,"abstract":"Mobile devices have been pervading many aspects of our lives, including applications that are critical and deal with sensitive data. Together with existing features, designers are required to add cryptographic primitives capable of guaranteeing privacy of the users and security of the operations. However, for pervasive mobile devices, the simple addition of cryptographic capabilities is not sufficient.In this paper, we discuss, from the hardware prospective,three main security challenges faced by designers while designing mobile devices: physical attacks, hardware Trojans, and software malware. For the first ones, we report mitigation techniques which can be already applied during the hardware design flow. For the last one, which is mainly related to software, we discuss its potential hardware implications.","PeriodicalId":252572,"journal":{"name":"2015 Mobile Systems Technologies Workshop (MST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信