Risk
4/5/2010
04:42 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
Repost This

Software Research Promises Faster Apps

A new approach to memory management allows computer code to operate more efficiently on multicore processors and can reduce the overhead of security checks.

A paper to be presented later this month at the IEEE International Parallel and Distributed Processing Symposium in Atlanta, Georgia, describes a new approach to memory management that allows software applications to run up to 20% faster on multicore processors.

"MMT: Exploiting Fine-Grained Parallelism in Dynamic Memory Management," co-authored by North Carolina State University (NCSU) researchers Devesh Tiwari, Sanghoon Lee, James Tuck, and Yan Solihin, proposes "a new approach for accelerating dynamic memory management on multicore architecture, by offloading dynamic management functions to a separate thread that we refer to as memory management thread (MMT)."

Multicore processors are now the norm in the computer industry, but many programmers have yet to learn how best to write programs that process data in parallel using all of the processor cores at once.

In a move that suggests the extent of the problem, Microsoft and Intel two years ago said they'd spend $20 million over the next five years to advance academic research on parallel computing.

Yan Solihin, associate professor of electrical and computer engineering at NCSU and a co-author of the paper, explained in a phone interview that MMT offers a way to make applications more efficient by moving memory management to a separate thread. This allows the application and its memory management code to execute at the same time.

"We noticed that there's a large group of software that's difficult to paralellize," he said. "A lot of these applications are also memory allocation intensive, meaning that that call malloc or free frequently. So our idea is to move this memory allocation to a separate thread. We call that the memory management thread, or MMT"

Solihin says the technique has been encapsulated into a library. To use it, a programmer merely needs to link to the library from his or her program. It can accelerate both client-side and server-side applications, such as Web servers and parsers, he said.

Used with memory management library called PHKmalloc, for example, MMT can limit the slowdown imposed by some of the library's security features. "Our focus is that these security checks and features are very expensive, slowing down our benchmarks by 21% on average, and by 44% in the worst case," the paper states. "The figure shows that MMT can hide the overheads almost completely, with an average slowdown of only 1%."

The paper is scheduled to be presented on April 21, 2010.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web