KPAT: A kernel and protocol analysis tool for embedded networking devices

Ming Hung Wang, Chia Ming Yu, Chia Liang Lin, Chien-Chao Tseng, Li-Hsing Yen

研究成果: Conference contribution同行評審

3 引文 斯高帕斯(Scopus)

摘要

Sniffer tools capture protocol data. Kernel-profiling tools track function calls and events occurring in the kernel. These two types of tools help us observe external and internal behaviors of networking protocols, respectively. We need both types of data for a comprehensive view of protocol behavior. However, none of existing tools performs these two tasks in an integrated way. We developed Kernel and Protocol Analysis Tool (KPAT). KPAT injects software probes into Linux kernel to track interested function calls and event occurrences in the kernel. Probe injection is done systematically and does not require recompiling the kernel. A module in KPAT finds the association between the tracked functions and protocol data captured by an independent sniffer. The result as an integrated log allows users to identify two-way relationship between protocol data and the execution sequence of network functions in the kernel. We successfully used KPAT to identity accurate latency of each handover phase in IEEE 802.11 wireless networks. Experimental results show that KPAT causes light overhead to the patched kernel.

原文English
主出版物標題2014 IEEE International Conference on Communications, ICC 2014
發行者IEEE Computer Society
頁面1160-1165
頁數6
ISBN(列印)9781479920037
DOIs
出版狀態Published - 1 一月 2014
事件2014 1st IEEE International Conference on Communications, ICC 2014 - Sydney, NSW, Australia
持續時間: 10 六月 201414 六月 2014

出版系列

名字2014 IEEE International Conference on Communications, ICC 2014

Conference

Conference2014 1st IEEE International Conference on Communications, ICC 2014
國家/地區Australia
城市Sydney, NSW
期間10/06/1414/06/14

指紋

深入研究「KPAT: A kernel and protocol analysis tool for embedded networking devices」主題。共同形成了獨特的指紋。

引用此