Sciweavers

124 search results - page 4 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
ENTCS
2008
87views more  ENTCS 2008»
14 years 9 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
HOTOS
2003
IEEE
15 years 2 months ago
Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection
Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of bot...
Emmett Witchel, Krste Asanovic
EUROSYS
2008
ACM
15 years 6 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
OSDI
1996
ACM
14 years 11 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
SIGSOFT
2010
ACM
14 years 7 months ago
Building scalable software systems in the multicore era
Software systems must face two challenges today: growing complexity and increasing parallelism in the underlying computational models. The problem of increased complexity is often...
Hridesh Rajan