2020
DOI: 10.1109/access.2020.2964260
|View full text |Cite
|
Sign up to set email alerts
|

Redundancy Analysis and Elimination on Access Patterns of the Windows Applications Based on I/O Log Data

Abstract: In this paper, we analyze I/O log data monitored in the Windows operating system for improving the system performance. Especially, we focus on the I/O operations to the Windows registry. As a result, we identify redundant access patterns of the Windows applications. To find all the possible redundant patterns from the large-scale log data, we propose the redundancy detection algorithm. Then, we propose the two-level redundancy elimination method to remove unnecessary redundant operations. We also present an ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Data encryption based on big data attributes is one of the effective methods to control data access users in the data outsourcing environment, but in the calculation process, it is impossible to realize the parallel application of multiple encryption methods. If the method is constantly updated, it will affect the execution efficiency of the overall algorithm and increase the time overhead [1]. In order to solve this problem, experts in relevant fields have obtained some good research results.…”
Section: Introductionmentioning
confidence: 99%
“…Data encryption based on big data attributes is one of the effective methods to control data access users in the data outsourcing environment, but in the calculation process, it is impossible to realize the parallel application of multiple encryption methods. If the method is constantly updated, it will affect the execution efficiency of the overall algorithm and increase the time overhead [1]. In order to solve this problem, experts in relevant fields have obtained some good research results.…”
Section: Introductionmentioning
confidence: 99%
“…In the Windows registry, the registry key and its corresponding registry value are stored in the form of a key-value pair. The Windows registry stores critical information, including user accounts and program locations executed, when the system is booting [2,3]. This information can be abused for cyberattacks such as dll hijacking, malware persistence, and privilege escalation by manipulating the stored information.…”
Section: Introductionmentioning
confidence: 99%