Results 1 - 10
of
1,972
Access Control based on Execution History
- In Proceedings of the 10th Annual Network and Distributed System Security Symposium
, 2003
"... Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic applets and also, for example, distributed applications, Web services, and programmable networks, with appropriate security ..."
Abstract
-
Cited by 117 (4 self)
- Add to MetaCart
expectations. Accordingly, they feature elaborate constructs and mechanisms for associating rights with code, including a technique for determining the run-time rights of a piece of code as a function of the state of the execution stack. These mechanisms prevent many security holes, but they are inherently
Matching Execution Histories of Program Versions ∗
"... We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy detection and several debugging scenarios. Unlike some static approaches for matching program versions, our approach doe ..."
Abstract
- Add to MetaCart
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy detection and several debugging scenarios. Unlike some static approaches for matching program versions, our approach
Access control by tracking shallow execution history
- In Proceedings of the 2004 IEEE Symposium on Security and Privacy
, 2004
"... Abstract Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential demages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern ..."
Abstract
-
Cited by 65 (9 self)
- Add to MetaCart
Abstract Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential demages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access
Combining Branch Predictors
, 1993
"... One of the key factors determining computer performance is the degree to which the implementation can take advantage of instruction-level paral-lelism. Perhaps the most critical limit to this parallelism is the presence of conditional branches that determine which instructions need to be executed ne ..."
Abstract
-
Cited by 629 (0 self)
- Add to MetaCart
One of the key factors determining computer performance is the degree to which the implementation can take advantage of instruction-level paral-lelism. Perhaps the most critical limit to this parallelism is the presence of conditional branches that determine which instructions need to be executed
Execution History Guided Instruction Prefetching
- in Proc. Intl. Conf. on Supercomputing, 2002
, 2002
"... The increasing gap in performance between processors and main memory has made effective instructions prefetching techniques more important than ever. A major deficiency of existing prefetching methods is that most of them require an extra port to I-cache. A recent study by [19] shows that this fa ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
The increasing gap in performance between processors and main memory has made effective instructions prefetching techniques more important than ever. A major deficiency of existing prefetching methods is that most of them require an extra port to I-cache. A recent study by [19] shows that this factor alone explains why most modern microprocessors do not use such I-cache hardware-based I-cache prefetch schemes. The contribution of this paper is two-fold. First we present a method that does not require an extra port to I-cache.
Execution History Guided Instruction Prefetching
- in Proc. Intl. Conf. on Supercomputing, 2002
, 2003
"... The increasing gap in performance between processors and main memory has made effective instructions prefetching techniques more important than ever. A major deficiency of existing prefetching methods is that most of them require an extra port to I-cache. A recent study by [19] shows that this fa ..."
Abstract
- Add to MetaCart
The increasing gap in performance between processors and main memory has made effective instructions prefetching techniques more important than ever. A major deficiency of existing prefetching methods is that most of them require an extra port to I-cache. A recent study by [19] shows that this factor alone explains why most modern microprocessors do not use such hardware-based I-cache prefetch schemes. The contribution of this paper is two-fold.
DerivingProcess-RelatedRBACModelsfromProcessExecutionHistories
"... Abstract—In a business process context, access permissions grant therights toperform certaintasks. Inparticular,processrelated role-based access control (RBAC) models define RBAC policies for process-aware information systems (PAIS). In addition, process-related RBAC models allow for the definition ..."
Abstract
- Add to MetaCart
of entailment constraints on tasks, such as mutual exclusion or binding constraints, for example. This paper presents an approach to derive process-related RBAC models from process execution histories recorded by a PAIS. In particular, we presentalgorithms to derive correspondingRBAC artifacts and entailment
Dynamic Program Slicing
, 1990
"... The conventional notion of a program slice---the set of all statements that might affect the value of a variable occurrence---is totally independent of the program input values. Program debugging, however, involves analyzing the program behavior under the specific inputs that revealed the bug. In th ..."
Abstract
-
Cited by 415 (7 self)
- Add to MetaCart
in computing dynamic slices is discussed. We introduce the concept of a Reduced Dynamic Dependence Graph whose size does not depend on the length of execution history, which is unbounded in general, but whose size is bounded and is proportional to the number of dynamic slices arising during the program
Visual-MCM: Visualising Execution Histories on Multiple Memory Consistency Models
- in Lecture Notes in Computer Science 1557
, 1999
"... . The behaviour of Distributed Shared Memory Systems is dictated by the memory consistency model. In order to provide a better understanding on the semantics of the memory models, many researchers have proposed formalisms to define them. Even with formal definitions, it is still difficult to say ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
to say what kind of execution histories can be produced on a particular memory model. In this paper, we propose Visual-MCM, a visualisation tool that shows what operations orderings could lead to user-defined execution histories on different memory models. We also present a prototype of Visual
Automatic Comparison of Execution Histories in the Debugging of Distributed Applications
, 1999
"... Trends in the development of computer hardware are making the use of distributed systems increasingly attractive. The collection of events representing interactions between processes and the construction of process-time diagrams can provide a useful visualization tool. In practical situations, howev ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
, however, these diagrams are too large for users find them comprehensible. The ability to automatically compare two execution diagrams and locate the differences between them can help to alleviate this problem. This thesis
Results 1 - 10
of
1,972