Sciweavers

29 search results - page 2 / 6
» sigopse 2004
Sort
View
SIGOPSE
2004
ACM
13 years 10 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
SIGOPSE
2004
ACM
13 years 10 months ago
Undo for anyone, anywhere, anytime
Computer systems are complex and unforgiving. Users need environments more tolerant of errors, allowing them to correct mistakes and explore alternatives. This is the aim of Joyce...
James O'Brien, Marc Shapiro
SIGOPSE
2004
ACM
13 years 10 months ago
Impeding attrition attacks in P2P systems
—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...
SIGOPSE
2004
ACM
13 years 10 months ago
When physical is not real enough
This position paper argues that policies for physical memory management and for memory power mode control should be relocated to the system software of a programmable memory manag...
Frank Bellosa
SIGOPSE
2004
ACM
13 years 10 months ago
Using AOP to develop architectural-neutral operating system components
The architecture of an operating system, e.g. micro kernel or monolithic kernel, is usually seen as something static. Even during the long lasting evolution of operating system co...
Olaf Spinczyk, Daniel Lohmann