In this paper, we focus on concurrent programs that use locks to achieve isolation of data accessed by critical sections of code. We present Isolator, an algorithm that guarantees isolation in well-behaved threads of a program that obey a locking discipline even in the presence of ill-behaved threads that dis-obey the locking discipline. Isolator uses code instrumentation, data replication, and virtual memory protection to detect isolation violations and delays ill-behaved threads to ensure isolation. Our instru-mentation scheme requires access only to the code of well-behaved threads. We have evaluated Isolator on several benchmark programs and found that Isolator can ensure isolation with reasonable runtime overheads. In addition, we pres...
Abstract Read-write locking is an important mecha-nism to improve concurrent granularity, but it is ...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
We are used to use computers on which programs from diverse origins are installed and running at the...
When lock-based parallel programs execute on conventional multi-core hardware, faulty software can c...
From the introduction to concurrency, we saw one of the fundamental problems in concurrent programmi...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
Abstract. In this paper we propose a lock assignment technique to sim-plify the mutual exclusion enf...
Isolation—the property that a task can access shared data without interference from other tasks—is o...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
Proving only over source code that programs do not leak sensitive data leaves a gap between reasonin...
In this paper we present substantially improved thread partitioning algorithms for modern implicitly...
Before moving beyond locks, we’ll first describe how to use locks in some common data structures. Ad...
In this paper we present substantially improved thread partitioning algorithms for modern implicitly...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
The last decade has seen the transition from single-core processors to multi-cores and many-cores. T...
Abstract Read-write locking is an important mecha-nism to improve concurrent granularity, but it is ...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
We are used to use computers on which programs from diverse origins are installed and running at the...
When lock-based parallel programs execute on conventional multi-core hardware, faulty software can c...
From the introduction to concurrency, we saw one of the fundamental problems in concurrent programmi...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
Abstract. In this paper we propose a lock assignment technique to sim-plify the mutual exclusion enf...
Isolation—the property that a task can access shared data without interference from other tasks—is o...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
Proving only over source code that programs do not leak sensitive data leaves a gap between reasonin...
In this paper we present substantially improved thread partitioning algorithms for modern implicitly...
Before moving beyond locks, we’ll first describe how to use locks in some common data structures. Ad...
In this paper we present substantially improved thread partitioning algorithms for modern implicitly...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
The last decade has seen the transition from single-core processors to multi-cores and many-cores. T...
Abstract Read-write locking is an important mecha-nism to improve concurrent granularity, but it is ...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
We are used to use computers on which programs from diverse origins are installed and running at the...