Proof-carrying code

GC Necula - Proceedings of the 24th ACM SIGPLAN-SIGACT …, 1997 - dl.acm.org
This paper describes proof-carrying code (PCC), a mechanism by which a host system can
determine with certainty that it is safe to execute a program supplied (possibly in binary form) …

SEDA: An architecture for well-conditioned, scalable internet services

M Welsh, D Culler, E Brewer - ACM SIGOPS operating systems review, 2001 - dl.acm.org
We propose a new design for highly concurrent Internet services, which we call the staged
event-driven architecture (SEDA). SEDA is intended to support massive concurrency …

Memory coherence in shared virtual memory systems

K Li, P Hudak - ACM Transactions on Computer Systems (TOCS), 1989 - dl.acm.org
The memory coherence problem in designing and implementing a shared virtual memory on
loosely coupled multiprocessors is studied in depth. Two classes of algorithms, centralized …

[PS][PS] Safe kernel extensions without run-time checking

GC Necula, P Lee - OSDI, 1996 - usenix.org
This paper describes a mechanism by which an operating system kernel can determine with
certainty that it is safe to execute a binary supplied by an untrusted source. The kernel rst de …

Application performance and flexibility on exokernel systems

MF Kaashoek, DR Engler, GR Ganger… - Proceedings of the …, 1997 - dl.acm.org
The exokemel operating system architecture safely gives untrusted software efficient control
over hardware and software resources by separating management from protection. This …

K42: building a complete operating system

O Krieger, M Auslander, B Rosenburg… - ACM SIGOPS …, 2006 - dl.acm.org
K42 is one of the few recent research projects that is examining operating system design
structure issues in the context of new whole-system design. K42 is open source and was …

System Support for Online Reconfiguration.

CAN Soules, J Appavoo, K Hui… - USENIX Annual …, 2003 - usenix.org
Online reconfiguration provides a way to extend and replace active operating system
components. This provides administrators, developers, applications, and the system itself …

Extension framework for file systems in user space

A Bijlani, U Ramachandran - 2019 USENIX Annual Technical …, 2019 - usenix.org
User file systems offer numerous advantages over their in-kernel implementations, such as
ease of development and better system reliability. However, they incur heavy performance …

Specification and verification in the field: Applying formal methods to {BPF} just-in-time compilers in the linux kernel

L Nelson, J Van Geffen, E Torlak, X Wang - 14th USENIX Symposium on …, 2020 - usenix.org
This paper describes our experience applying formal methods to a critical component in the
Linux kernel, the just-in-time compilers (" JITs") for the Berkeley Packet Filter (BPF) virtual …

The ACTIVE IP option

DJ Wetherall, DL Tennenhouse - Proceedings of the 7th workshop on …, 1996 - dl.acm.org
In this paper, we discuss our work on an active network architecture in which passive
packets are replaced with active capsules---encapsulated program fragments that are …