Sciweavers

ASPLOS
2006
ACM
13 years 10 months ago
Automatic generation of peephole superoptimizers
Peephole optimizers are typically constructed using human-written pattern matching rules, an approach that requires expertise and time, as well as being less than systematic at ex...
Sorav Bansal, Alex Aiken
ASPLOS
2006
ACM
13 years 10 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
ASPLOS
2006
ACM
13 years 10 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
ASPLOS
2006
ACM
13 years 10 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
ASPLOS
2006
ACM
13 years 10 months ago
Dependable != unaffordable
This paper presents a software architecture for hardware fault tolerance based on loosely-synchronized, redundant virtual machines (LSRVM). LSRVM will provide high levels of relia...
Alan L. Cox, Kartik Mohanram, Scott Rixner
ASPLOS
2006
ACM
13 years 10 months ago
SecCMP: a secure chip-multiprocessor architecture
Security has been considered as an important issue in processor design. Most of the existing mechanisms address security and integrity issues caused by untrusted main memory in si...
Li Yang, Lu Peng
ASPLOS
2006
ACM
13 years 10 months ago
Issues in holistic system design
The coordination of layers in computer and software systems is one of the main challenges in designing such systems today. In this paper we consider Holistic System Design as a wa...
Julia L. Lawall, Christian W. Probst, Ulrik Pagh S...
ASPLOS
2006
ACM
13 years 10 months ago
A: an assertion language for distributed systems
Operator mistakes have been identified as a significant source of unavailability in Internet services. In this paper, we propose a new language, A , for service engineers to writ...
Andrew Tjang, Fábio Oliveira, Richard P. Ma...