• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,168
Next 10 →

Avoiding program failures through safe execution perturbations

by Sriraman Tallam, Google Inc, Chen Tian, Rajiv Gupta, Xiangyu Zhang - In COMPSAC , 2008
"... We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations are safe as they respect the semantics of the program. We use a checkpointing/logging mechanism to capture a program execu ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations are safe as they respect the semantics of the program. We use a checkpointing/logging mechanism to capture a program

Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications

by R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. Duvarney , 2003
"... This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a concise highlevel model of its security-relevant behavior. This model helps bridge the gap between high-level security p ..."
Abstract - Cited by 107 (15 self) - Add to MetaCart
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a concise highlevel model of its security-relevant behavior. This model helps bridge the gap between high-level security

Memory-safe Execution of C on a Java VM

by Matthias Grimmer, Roland Schatz, Chris Seaton
"... In low-level languages such as C, spatial and temporal safety errors (e.g. buffer overflows or dangling pointer derefer-ences) are hard to find and can cause security vulnerabilities. Modern high-level languages such as Java avoid these prob-lems by running programs on a virtual machine that provide ..."
Abstract - Add to MetaCart
that provides automated memory management. In this paper we show how we can safely execute C code on top of a modern runtime (e.g., a Java Virtual Machine) by allocating all data on the managed heap. We reuse the memory management of the runtime, hence, we can ensure spatial and temporal safety with little

Type-Safe Execution of Mobile Agents in Anonymous Networks

by Matthew Hennessy, Matthew Hennessy, James Riely, James Riely - In Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Lecture Notes in Computer Science , 1998
"... . We present a partially-typed semantics for Dp, a distributed p-calculus. The semantics is designed for open distributed systems in which some sites may harbor malicious agents. Nonetheless, the semantics guarantee traditional type-safety properties at "good" locations by using a mixture ..."
Abstract - Cited by 38 (2 self) - Add to MetaCart
Introduction In [7] we presented a type system for controlling the use of resources in a distributed system. The type system guarantees that resource access is always safe, in the sense that, for example, integer channels are always used with integers and boolean channels are always used with booleans

Efficient and safe execution of user-level code in the kernel

by Erez Zadok, Sean Callanan, Abhishek Rai, Gopalan Sivathanu, Avishay Traeger - 1999 IEEE November 10 - 13, 1999 San Juan, Puerto Rico 29 th ASEE/IEEE Frontiers in Education Conference 13a6 -11 J., Duerden S., & Helfers C., “Teaching Engineering Students Their Own Discourse,” Frontiers in Education , 2005
"... This project has two goals. The first goal is to improve application performance by reducing context switches and data copies. We do this by either running select sections of the application in kernel-mode, or by creating new, more efficient system calls. The second goal is to ensure that kernel saf ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
This project has two goals. The first goal is to improve application performance by reducing context switches and data copies. We do this by either running select sections of the application in kernel-mode, or by creating new, more efficient system calls. The second goal is to ensure that kernel safety is not violated when running user-level code in the kernel. We do this by implementing various hardware- and software-based techniques for runtime monitoring of memory buffers, pointers, as well as higher-level, OS-specific constructs such as spinlocks and reference counters; the latter techniques can also be used for code written specifically for the OS. We prototyped several of these techniques. For certain applications, we demonstrate performance improvements as high as 80%. Moreover, our kernel safety checks show overheads that are as little as 2%. 1

Constructing a Language for Security and Safe Execution

by Sam Weber, Jonathan S. Shapiro
"... The introduction of Web applets and servlets has sparked interest in security at the language level. Users want applets to be able to read and write local information, and also to be able to access the network. Despite this, they require assurance that the applet does not disclose sensitive informat ..."
Abstract - Add to MetaCart
propose a new, efficiently implementable language feature -- references which incorporate access control. We introduce a multi-threaded programming language in which an untrusted and unexamined piece of code can be executed with permission to read certain shared data, write to other locations, and yet

One-way isolation: An effective approach for realizing safe execution environments

by Weiqing Sun, Zhenkai Liang, R. Sekar, V. N. Venkatakrishnan - In Proceedings of the Network and Distributed System Security Symposium , 2005
"... In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing software) without the fear of damaging the system in any manner. A key property of our SEE is that it faithfully reproduces the be ..."
Abstract - Cited by 49 (8 self) - Add to MetaCart
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing software) without the fear of damaging the system in any manner. A key property of our SEE is that it faithfully reproduces

Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems

by John Criswell, Andrew Lenharth - SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES , 2007
"... This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines a virtual, low-level, typed instruction set suitable for execu ..."
Abstract - Cited by 44 (7 self) - Add to MetaCart
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines a virtual, low-level, typed instruction set suitable

Maté: A Tiny Virtual Machine for Sensor Networks

by Philip Levis, David Culler , 2002
"... Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems problems and constraints. The large number of motes in a sensor network means that there will often be some failing nodes; networks must be easy to repopu-late. ..."
Abstract - Cited by 510 (21 self) - Add to MetaCart
capsules enable the deploy-ment of ad-hoc routing and data aggregation algorithms. Maté's concise, high-level program representation simplifies programming and allows large networks to be frequently re-programmed in an energy-efficient manner; in addition, its safe execution environment suggests a use

Safe Kernel Extensions Without Run-Time Checking

by George C. Necula, Peter Lee - Proc. of OSDI'96
"... Abstract This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries i ..."
Abstract - Cited by 429 (20 self) - Add to MetaCart
Abstract This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries
Next 10 →
Results 1 - 10 of 2,168
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University