Sciweavers

2726 search results - page 18 / 546
» Application security support in the operating system kernel
Sort
View
OSDI
2006
ACM
16 years 4 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
DAC
2011
ACM
14 years 4 months ago
ChronOS Linux: a best-effort real-time multiprocessor Linux kernel
We present ChronOS Linux, a best-effort real-time Linux kernel for chip multiprocessors (CMPs). ChronOS addresses the intersection of three problem spaces: a) OS-support for obta...
Matthew Dellinger, Piyush Garyali, Binoy Ravindran
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 11 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ICMCS
1994
IEEE
110views Multimedia» more  ICMCS 1994»
15 years 8 months ago
Improving Continuous-Media Playback Performance with In-Kernel Data Paths
Continuous media playback suffers when a station's operating system offers insufficient 1/0 throughput. Conventional 1/0 system structures support a memory-oriented read and ...
Kevin R. Fall, Joseph Pasquale
128
Voted
SOFTWARE
2002
15 years 4 months ago
EROS: A Principle-Driven Operating System from the Ground Up
certain kinds of abstraction that modern operating systems generally include and seek a design that maps directly onto the features that modern hardware implementations provide; ve...
Jonathan S. Shapiro, Norman Hardy