Sciweavers

1098 search results - page 160 / 220
» System safety as an emergent property in composite systems
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 3 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
ATVA
2007
Springer
226views Hardware» more  ATVA 2007»
14 years 3 months ago
Bounded Model Checking of Analog and Mixed-Signal Circuits Using an SMT Solver
This paper presents a bounded model checking algorithm for the verification of analog and mixed-signal (AMS) circuits using a satisfiability modulo theories (SMT) solver. The sys...
David Walter, Scott Little, Chris J. Myers
RTAS
2006
IEEE
14 years 2 months ago
Network-Code Machine: Programmable Real-Time Communication Schedules
Distributed hard real-time systems require guaranteed communication. One common approach is to restrict network access by enforcing a time-division multiple access (TDMA) schedule...
Sebastian Fischmeister, Oleg Sokolsky, Insup Lee
WORDS
2005
IEEE
14 years 2 months ago
A Framework for Simplifying the Development of Kernel Schedulers: Design and Performance Evaluation
Writing a new scheduler and integrating it into an existing OS is a daunting task, requiring the understanding of multiple low-level kernel mechanisms. Indeed, implementing a new ...
Gilles Muller, Julia L. Lawall, Hervé Duche...
CCS
2005
ACM
14 years 2 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...