Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Modern processor architectures call for software that is highly tuned to an unpredictable operating environment. Processlevel virtualization systems allow existing software to ada...
In this paper we describe the design, implementation and experimental evaluation of a technique for operating system schedulers called processor pool-based scheduling [51]. Our tec...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Besides ordinary applications, also infrastructure software such as operating systems or database management systems is being developed as a software product line. With proper too...