Risk
4/5/2010
04:42 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Software Research Promises Faster Apps

A new approach to memory management allows computer code to operate more efficiently on multicore processors and can reduce the overhead of security checks.

A paper to be presented later this month at the IEEE International Parallel and Distributed Processing Symposium in Atlanta, Georgia, describes a new approach to memory management that allows software applications to run up to 20% faster on multicore processors.

"MMT: Exploiting Fine-Grained Parallelism in Dynamic Memory Management," co-authored by North Carolina State University (NCSU) researchers Devesh Tiwari, Sanghoon Lee, James Tuck, and Yan Solihin, proposes "a new approach for accelerating dynamic memory management on multicore architecture, by offloading dynamic management functions to a separate thread that we refer to as memory management thread (MMT)."

Multicore processors are now the norm in the computer industry, but many programmers have yet to learn how best to write programs that process data in parallel using all of the processor cores at once.

In a move that suggests the extent of the problem, Microsoft and Intel two years ago said they'd spend $20 million over the next five years to advance academic research on parallel computing.

Yan Solihin, associate professor of electrical and computer engineering at NCSU and a co-author of the paper, explained in a phone interview that MMT offers a way to make applications more efficient by moving memory management to a separate thread. This allows the application and its memory management code to execute at the same time.

"We noticed that there's a large group of software that's difficult to paralellize," he said. "A lot of these applications are also memory allocation intensive, meaning that that call malloc or free frequently. So our idea is to move this memory allocation to a separate thread. We call that the memory management thread, or MMT"

Solihin says the technique has been encapsulated into a library. To use it, a programmer merely needs to link to the library from his or her program. It can accelerate both client-side and server-side applications, such as Web servers and parsers, he said.

Used with memory management library called PHKmalloc, for example, MMT can limit the slowdown imposed by some of the library's security features. "Our focus is that these security checks and features are very expensive, slowing down our benchmarks by 21% on average, and by 44% in the worst case," the paper states. "The figure shows that MMT can hide the overheads almost completely, with an average slowdown of only 1%."

The paper is scheduled to be presented on April 21, 2010.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2006-1318
Published: 2014-09-19
Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, Office 2004 for Mac, and Office X for Mac do not properly parse record lengths, which allows remote attackers to execute arbitrary code via a malformed control in an Office document, aka "Microsoft Office Control Vulnerability."

CVE-2012-2588
Published: 2014-09-19
Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Enterprise 6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, or (3) Subject header or (4) body in an SMTP e-mail message.

CVE-2012-6659
Published: 2014-09-19
Cross-site scripting (XSS) vulnerability in the admin interface in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-1391
Published: 2014-09-19
QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with RLE encoding.

CVE-2014-3614
Published: 2014-09-19
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets.

Best of the Web
Dark Reading Radio