Filters








112 Hits in 4.8 sec

Interposition agents

Michael B. Jones
1993 ACM SIGOPS Operating Systems Review  
In this way, the known benefits of interposition can also be extended to the domain of the system interface.  ...  can also be successfully used to extend the system interface.  ...  User code interposed at system interface 1A. Motivation Today, agents are regularly written to be interposed on simple communication-based interfaces such as pipes and sockets.  ... 
doi:10.1145/173668.168626 fatcat:2kt24r5yifakvemgyiagbc6ssi

Transparently interposing user code at the system interface

M.B. Jones
[1992] Proceedings Third Workshop on Workstation Operating Systems  
This dissertation presents a toolkit that substantially increases the ease of interposing user code between clients and instances of the system interface by allowing such code to be written in terms of  ...  Using them has typically required reimplementation of a substantial portion of the system interface from scratch, making the use of such facilities unwieldy at best.  ...  Overview of Past Agents and Conclusions A large number of systems have provided low-level facilities sufficient to interpose user code at the system interface.  ... 
doi:10.1109/wwos.1992.275680 fatcat:j7ttizzwr5h5fh5armmbdeakxa

FreeNA: A Multi-Platform Framework for Inserting Upper-Layer Network Services

Ryota KAWASHIMA, Yusheng JI, Katsumi MARUYAMA
2009 IEICE transactions on information and systems  
This extension does not require users to modify their systems at all. Therefore, FreeNA is valuable for experimental system usage.  ...  , transparent functions insertion, systemcall interposition, multi-platform framework, SSL  ...  Then, FreeNA enables users to transparently insert user codes into the application without the source code and any modification.  ... 
doi:10.1587/transinf.e92.d.1923 fatcat:y6zhb3gf75evzgx3xaylbrf3d4

BrowserShield

Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir
2007 ACM Transactions on the Web  
The key challenge in filtering dynamic HTML is that it is undecidable to statically determine whether an embedded script will exploit the browser at run-time.  ...  We avoid this undecidability problem by rewriting web pages and any embedded scripts into safe equivalents, inserting checks so that the filtering is done at run-time.  ...  System Call Interface Much previous work has modified user level program behavior by interposing on the system call interface.  ... 
doi:10.1145/1281480.1281481 fatcat:343pcvsna5hhpbep4sbreqqhgy

THROOM – Supporting POSIX Multithreaded Binaries on a Cluster [chapter]

Henrik Löf, Zoran Radović, Erik Hagersten
2003 Lecture Notes in Computer Science  
Most software distributed shared memory systems (SW-DSMs) lack industry standard interfaces that limit their applicability to a small set of shared-memory applications.  ...  This paper presents a runtime system concept that enables unmodified POSIX P1003.1c (Pthreads) compliant binaries to run transparently on clustered hardware.  ...  To make the whole system transparent, we implement it as a shared library to be interposed at program loading. 5.  ... 
doi:10.1007/978-3-540-45209-6_105 fatcat:nsmxiyz5abhariedzcaqhdmmli

Creating Private Network Overlays for High Performance Scientific Computing [chapter]

Edward Walker
2007 Lecture Notes in Computer Science  
The interposed private network overlay allows the personal clusters to tunnel IP traffic thorough gateway nodes at each contributing HPC cluster site in order to provision resources across private networks  ...  In this paper we describe an approach in creating private network overlays in user-space to support the dynamic creation of personal clusters ondemand.  ...  Interposition Mechanisms The system supports two mechanisms for interposing our network overlay functionality into the BSD socket call interface.  ... 
doi:10.1007/978-3-540-76778-7_11 fatcat:j65yb4f7n5evtafygnsvq57ium

Composing OS extensions safely and efficiently with Bascule

Andrew Baumann, Dongyoon Lee, Pedro Fonseca, Lisa Glendenning, Jacob R. Lorch, Barry Bond, Reuben Olinsky, Galen C. Hunt
2013 Proceedings of the 8th ACM European Conference on Computer Systems - EuroSys '13  
Extensions interpose on a narrow binary interface of primitive OS abstractions, such as files and virtual memory. Thus, they are independent of both guest and host OS, and composable at runtime.  ...  Library OS (LibOS) architectures implement the OS personality as a user-mode library, giving each application the flexibility to choose its LibOS.  ...  Acknowledgments We would like to thank the anonymous reviewers, Jon Howell, and particularly our shepherd, Frans Kaashoek, for their constructive feedback that significantly improved this paper.  ... 
doi:10.1145/2465351.2465375 dblp:conf/eurosys/BaumannLFGLBOH13 fatcat:gl67m7hzgfbarmenqwmghgqkqm

Improving the reliability of commodity operating systems

Michael M. Swift, Brian N. Bershad, Henry M. Levy
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
crashes with little or no change to the existing driver and system code.  ...  architectures and type-safe languages required by previous efforts directed at safe extensibility.  ...  Augier for his work on the recovery agent and on reliability testing.  ... 
doi:10.1145/945445.945466 dblp:conf/sosp/SwiftBL03 fatcat:a6c2wwotb5crlf5q5jm25vdy6e

Improving the reliability of commodity operating systems

Michael M. Swift, Brian N. Bershad, Henry M. Levy
2003 ACM SIGOPS Operating Systems Review  
crashes with little or no change to the existing driver and system code.  ...  architectures and type-safe languages required by previous efforts directed at safe extensibility.  ...  Augier for his work on the recovery agent and on reliability testing.  ... 
doi:10.1145/1165389.945466 fatcat:6leoyuwd2bd2dgebv46zigis5a

Improving the reliability of commodity operating systems

Michael M. Swift, Brian N. Bershad, Henry M. Levy
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
crashes with little or no change to the existing driver and system code.  ...  architectures and type-safe languages required by previous efforts directed at safe extensibility.  ...  Augier for his work on the recovery agent and on reliability testing.  ... 
doi:10.1145/945465.945466 fatcat:s3mtk5zegzhlph7smb4ti2httq

Improving the reliability of commodity operating systems

Michael M. Swift, Brian N. Bershad, Henry M. Levy
2005 ACM Transactions on Computer Systems  
crashes with little or no change to the existing driver and system code.  ...  architectures and type-safe languages required by previous efforts directed at safe extensibility.  ...  Augier for his work on the recovery agent and on reliability testing.  ... 
doi:10.1145/1047915.1047919 fatcat:lqb4fziluvhkjdvtdhhl75u66a

Visual proxy

M. Satyanarayanan, Jason Flinn, Kevin R. Walker
1999 ACM SIGOPS Operating Systems Review  
Government. bears a modicum of resemblance to the visual proxy idea is the use of an interposition toolkit to extend an operating system interface [3] .  ...  We call our solution a visual proxy: "proxy" because it involves redirection through an interposing layer of code; and "visual" because this proxy is located at the front end of a GUI-based application  ... 
doi:10.1145/311124.311131 fatcat:otq6wwjozzbdncanijktitco7a

CloudVisor

Fengzhe Zhang, Jin Chen, Haibo Chen, Binyu Zang
2011 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11  
The prototype system, called CloudVisor, comprises only 5.5K LOCs and supports the Xen VMM with multiple Linux and Windows as the guest OSes.  ...  ., VMM, management VM and tools) to handle complex tasks of managing leased VMs for the cloud, without breaking security of users' data inside the VMs.  ...  The code base is only around 5.5K lines of code (LOCs), which should be small and simple enough to verify. There is also an untrusted user-level CloudVisor agent in the QEMU module of Xen.  ... 
doi:10.1145/2043556.2043576 dblp:conf/sosp/ZhangCCZ11 fatcat:4z3ywg42enga5bhnqlev3mwbyq

Virtual machine-provided context sensitive page mappings

Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller
2008 Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '08  
Our technique takes advantage of the VMM's role in enforcing protection between guest operating systems to interpose on guest OS memory management operations and selectively introduce context sensitive  ...  We extend context sensitive page mappings to the virtual machine monitor, allowing operation independent of the guest operating system.  ...  Acknowledgments This work is supported in part by Department of Energy Grants DE-FG02-93ER25176 and DE-FG02-01ER25510, and National Science Foundataion grant 0627501 The U.S.  ... 
doi:10.1145/1346256.1346268 dblp:conf/vee/RosenblumCM08 fatcat:micojcwh6zddnptiolqg5vhbva

Transparent Checkpoint-Restart of Distributed Applications on Commodity Clusters

Oren Laadan, Dan Phung, Jason Nieh
2005 Proceedings IEEE International Conference on Cluster Computing  
We have created ZapC, a novel system for transparent coordinated checkpoint-restart of distributed network applications on commodity clusters.  ...  at a later time.  ...  Acknowledgments Yuly Finkelberg made many contributions to the ZapC Linux implementation.  ... 
doi:10.1109/clustr.2005.347039 dblp:conf/cluster/LaadanPN05 fatcat:hn4rirxqinaqxb725y3t6rdnoa
« Previous Showing results 1 — 15 out of 112 results