Sciweavers

Share
21 search results - page 1 / 5
» Safe Kernel Extensions Without Run-Time Checking
Sort
View
OSDI
1996
ACM
10 years 1 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
ENTCS
2002
166views more  ENTCS 2002»
9 years 11 months ago
Translation and Run-Time Validation of Optimized Code
The paper presents approaches to the validation of optimizing compilers. The emphasis is on aggressive and architecture-targeted optimizations which try to obtain the highest perf...
Lenore D. Zuck, Amir Pnueli, Yi Fang, Benjamin Gol...
CJ
2000
101views more  CJ 2000»
9 years 11 months ago
Safe Structural Conformance for Java
In Java, an interface specifies public abstract methods and associated public constants. Conformance of a class to an interface is by name. We propose to allow structural conforma...
Konstantin Läufer, Gerald Baumgartner, Vincen...
SOSP
2007
ACM
10 years 8 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
LATIN
2016
Springer
4 years 7 months ago
A Faster FPT Algorithm and a Smaller Kernel for Block Graph Vertex Deletion
A graph G is called a block graph if each maximal 2-connected component of G is a clique. In this paper we study the Block Graph Vertex Deletion from the perspective of fixed para...
Akanksha Agrawal, Sudeshna Kolay, Daniel Lokshtano...
books