Filters








3 Hits in 1.4 sec

Dependent Types for Low-Level Programming [chapter]

Jeremy Condit, Matthew Harren, Zachary Anderson, David Gay, George C. Necula
2007 Lecture Notes in Computer Science  
Deputy has been used to annotate and check a number of real-world C programs.  ...  technique for automatically inferring dependent types for local variables.  ...  Thanks to Feng Zhou, Ilya Bagrak, Bill McCloskey, Rob Ennals, and Eric Brewer for their contributions. This material is based upon work supported by the National Science Foundation under Grant Nos.  ... 
doi:10.1007/978-3-540-71316-6_35 fatcat:t5j5ccjhtzbz3cik3lbpe63zoq

Protecting Commodity Operating System Kernels from Vulnerable Device Drivers

Shakeel Butt, Vinod Ganapathy, Michael M. Swift, Chih-Cheng Chang
2008
We also present a runtime technique to automatically infer such integrity specifications.  ...  A RPC monitor mediates all control and data transfers between the kernel- and user-mode components.  ...  SafeDrive: Safe and recoverable extensions using language-based techniques. In OSDI, 2006. Figure 8. Results from fault injection.  ... 
doi:10.7282/t33b63km fatcat:h4uaiio6zzct7gfoqeimazshtq

The 7U Evaluation Method: Evaluating Software Systems via Runtime Fault-Injection and Reliability, Availability and Serviceability (RAS) Metrics and Models

Rean Griffith, Columbia University. Computer Science
2017
Second, identifying techniques that can be used to quantify RAS deficiencies in computing systems and reason about the efficacy of individual or combined RAS-enhancing mechanisms (at design-time or after  ...  Third, developing an evaluation methodology that can be used to objectively compare systems based on the (expected or actual) beneï¬ ts of RAS-enhancing mechanisms.  ...  Programming-language extensions e.g. SafeDrive [198] are also used to develop recoverable device drivers.  ... 
doi:10.7916/d8r2187c fatcat:q5fk5u7aercs7jt5etagaxyufy