Sciweavers

1299 search results - page 33 / 260
» On the Correctness of Operating System Kernels
Sort
View
263
Voted
POPL
2009
ACM
16 years 4 months ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
144
Voted
ASPLOS
2008
ACM
15 years 6 months ago
The design and implementation of microdrivers
Device drivers commonly execute in the kernel to achieve high performance and easy access to kernel services. However, this comes at the price of decreased reliability and increas...
Vinod Ganapathy, Matthew J. Renzelmann, Arini Bala...
SIGOPS
2008
170views more  SIGOPS 2008»
15 years 3 months ago
I/O resource management through system call scheduling
A principal challenge in operating system design is controlling system throughput and responsiveness while maximizing resource utilization. Unlike previous attempts in kernel reso...
Silviu S. Craciunas, Christoph M. Kirsch, Harald R...
USENIX
2004
15 years 5 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
116
Voted
NDSS
2009
IEEE
15 years 10 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee