of the Thesis Palladium: A System for Supporting Safe User Extensions Using Segmentation Hardware by Ganesh R. Venkitachalam Master of Science in Computer Science State University of New York at Stony Brook 1999 User Extensions extend the functionality of an existing user-level application by providing additional services to users that were not available in the original application. Typically, the services are rendered in a way that is transparent to the application being extended. Physically, an extension may run as a separate process independent of the application, or as a shared library loaded into the address space of the application. The separate-process model incurs severe performance overheads, whereas the shared library model leav...
We present SafeDrive, a system for detecting and recovering from type safety violations in software ...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
The technological evolution towards extensible software architectures and component-based software d...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...
The boundary between application and system is becoming increasingly permeable. Extensible applicati...
The boundary between application and system is becoming increasingly permeable. Extensible database ...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Because large, complex systems inevitably contain se-curity vulnerabilities, it is important to miti...
Empirically, operating systems are inevitably faced with application demands that the operating syst...
We present SafeDrive, a system for detecting and recovering from type safety violations in software ...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
The technological evolution towards extensible software architectures and component-based software d...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...
The boundary between application and system is becoming increasingly permeable. Extensible applicati...
The boundary between application and system is becoming increasingly permeable. Extensible database ...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Because large, complex systems inevitably contain se-curity vulnerabilities, it is important to miti...
Empirically, operating systems are inevitably faced with application demands that the operating syst...
We present SafeDrive, a system for detecting and recovering from type safety violations in software ...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...