Sciweavers

43 search results - page 6 / 9
» Protecting Commodity Operating System Kernels from Vulnerabl...
Sort
View
112
Voted
SOSP
1997
ACM
15 years 5 months ago
The Flux OSKit: A Substrate for Kernel and Language Research
Implementing new operating systems is tedious, costly, and often impractical except for large projects. The Flux OSKit addresses this problem in a novel way by providing clean, we...
Bryan Ford, Godmar Back, Greg Benson, Jay Lepreau,...
140
Voted
CCS
2007
ACM
15 years 10 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
125
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
134
Voted
CCS
2011
ACM
14 years 3 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...
133
Voted
APCSAC
2006
IEEE
15 years 9 months ago
Reorganizing UNIX for Reliability
In this paper, we discuss the architecture of a modular UNIX-compatible operating system, MINIX 3, that provides reliability beyond that of most other systems. With nearly the ent...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...