Sciweavers

1299 search results - page 135 / 260
» On the Correctness of Operating System Kernels
Sort
View
SIGOPS
2008
306views more  SIGOPS 2008»
15 years 4 months ago
virtio: towards a de-facto standard for virtual I/O devices
The Linux Kernel currently supports at least 8 distinct virtualization systems: Xen, KVM, VMware's VMI, IBM's System p, IBM's System z, User Mode Linux, lguest and ...
Rusty Russell
ACSAC
2004
IEEE
15 years 8 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
HASE
2008
IEEE
15 years 11 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
175
Voted
PODC
2006
ACM
15 years 10 months ago
Self-stabilizing byzantine agreement
Byzantine agreement algorithms typically assume implicit initial state consistency and synchronization among the correct nodes and then operate in coordinated rounds of informatio...
Ariel Daliot, Danny Dolev
NOSSDAV
1991
Springer
15 years 8 months ago
Multimedia Synchronization and UNIX
One of the most important emerging developments for improving the user/computer interface has been the addition of multimedia facilities to high-performance workstations. Although...
Dick C. A. Bulterman, Robert van Liere