-
公开(公告)号:GB2532400B
公开(公告)日:2020-06-03
申请号:GB201603638
申请日:2014-07-28
Applicant: IBM
Inventor: MICHAEL T BENHASE , LOKESH M GUPTA , TRUNG N NGUYEN , DAVID B WHITWORTH
IPC: G06F9/52
-
公开(公告)号:GB2532400A
公开(公告)日:2016-05-18
申请号:GB201603638
申请日:2014-07-28
Applicant: IBM
Inventor: MICHAEL T BENHASE , LOKESH M GUPTA , TRUNG N NGUYEN , DAVID B WHITWORTH
IPC: G06F9/52
Abstract: For efficient task scheduling using a locking mechanism, a new task is allowed to spin on the locking mechanism if a number of tasks spinning on the locking mechanism is less than a predetermined threshold for parallel operations requiring locks between the multiple threads.
-
公开(公告)号:GB2586409B
公开(公告)日:2021-07-14
申请号:GB202016053
申请日:2019-03-06
Applicant: IBM
Inventor: LOKESH GUPTA , MATTHEW BORLICK , TRUNG N NGUYEN , MICAH ROBISON
Abstract: Provided are a computer program product, system, and method for injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. A specified type of command is processed in application code and, in response, trap code is executed to allocate a trap address range. The specified type of command is executed in the application code. A determination is made as to whether an accessing application accesses the trap address range. At least one of transmitting a notification that the accessing application comprises potentially malicious code, monitoring the execution of the accessing application, and restricting execution of the accessing application is performed in response to determining that the accessing application accessed the trap address range.
-
公开(公告)号:GB2586409A
公开(公告)日:2021-02-17
申请号:GB202016053
申请日:2019-03-06
Applicant: IBM
Inventor: LOKESH GUPTA , MATTHEW BORLICK , TRUNG N NGUYEN , MICAH ROBISON
Abstract: Provided area computer program product, system, and method for injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. A specified type of command is processed in application code and, in response, trap code is executed to allocate a trap address range. The specified type of command is executed in the application code. A determination is made as to whether an accessing application accesses the trap address range. At least one of transmitting a notification that the accessing application comprises potentially malicious code, monitoring the execution of the accessing application, and restricting execution of the accessing application is performed in response to determining that the accessing application accessed the trap address range.
-
-
-