Results 1 - 10
of
749
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
are deleted, subsequently compromised nodes cannot decrypt old traffic. As a side benefit, onion replay detection is no longer necessary, and the process of building circuits is more reliable, since the initiator knows when a hop fails and can then try extending to a new node. Separation of "
Request
"... Strategic Goal: The air in every American community will be safe and healthy to breathe. In particular, children, the elderly, and people with respiratory ailments will be protected from health risks of breathing polluted air. Reducing air pollution will also protect the environment, resulting in ma ..."
Abstract
- Add to MetaCart
Strategic Goal: The air in every American community will be safe and healthy to breathe. In particular, children, the elderly, and people with respiratory ailments will be protected from health risks of breathing polluted air. Reducing air pollution will also protect the environment, resulting
Façade: An Experiment in Building a Fully-Realized Interactive Drama
, 2003
"... this paper we discuss our research and development towards creating an architecture, and a story design using this architecture, that integrates a broad and shallow approach to natural language processing, a novel character authoring language and a novel drama manager, in order to build an intera ..."
Abstract
-
Cited by 187 (17 self)
- Add to MetaCart
gettogether at their apartment that quickly turns ugly, you become entangled in the high-conflict dissolution of Grace and Trips marriage. No one is safe as the accusations fly, sides are taken and irreversible decisions are forced to be made. By the end of this intense oneact play you
Enhancing Server Availability and Security Through Failure-Oblivious Computing
- In Proceedings 6 th Symposium on Operating Systems Design and Implementation (OSDI
, 2004
"... We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code simply ..."
Abstract
-
Cited by 180 (37 self)
- Add to MetaCart
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code
The Safe-Tcl Security Model
, 1997
"... Safe-Tcl is a mechanism for controlling the execution of programs written in the Tcl scripting language. It allows untrusted scripts (applets) to be executed while preventing damage to the environment or leakage of private information. Safe-Tcl uses a padded cell approach: each applet is isolated in ..."
Abstract
-
Cited by 89 (0 self)
- Add to MetaCart
in a safe interpreter where it cannot interact directly with the rest of the application. The execution environment of the safe interpreter is controlled by trusted scripts running in a master interpreter. Safe-Tcl provides an alias mechanism that allows applets to request services from the master
Memoir: Practical State Continuity for Protected Modules
"... Abstract—To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This requires more than just preserving state confidentiality and integrity, since, e.g., software may err if its state is rolled back to ..."
Abstract
-
Cited by 26 (7 self)
- Add to MetaCart
to ensure rollback resistance without making the system vulnerable to system crashes. It does this by using a deterministic module, storing a concise summary of the module’s request history in protected NVRAM, and allowing only safe request replays after crashes. Since frequent NVRAM writes are impractical
Generative Design Rationale: Beyond the Record and Replay Paradigm
- COMPUTER SCIENCE DEPARTMENT, STANFORD UNIVERSITY
, 1993
"... Research in design rationale support must confront the fundamental questions of what kinds of design rationale information should be captured, and how rationales can be used to support engineering practice. This paper examines the kinds of information used in design rationale explanations, relating ..."
Abstract
-
Cited by 41 (2 self)
- Add to MetaCart
them to the kinds of computational services that can be provided. Implications for the design of software tools for design rationale support are given. The analysis predicts that the "record and replay" paradigm of structured note-taking tools (electronic notebooks, deliberation notes
Partial Replay of Long-Running Applications
"... Bugs in deployed software can be extremely difficult to track down. Invasive logging techniques, such as logging all nondeterministic inputs, can incur substantial runtime overheads. This paper shows how symbolic analysis can be used to re-create path equivalent executions for very long running prog ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
programs such as databases and web servers. The goal is to help developers debug such long-running programs by allowing them to walk through an execution of the last few requests or transactions leading up to an error. The challenge is to provide this functionality without the high runtime overheads
Consistent Synchronization Schemes for Workload Replay
"... Oracle Database Replay has been recently introduced in Oracle 11g as a novel tool to test relational database systems [9]. It involves recording the workload running on the database server in a production system, and subsequently replaying it on the database server in a test system. A key feature of ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
of workload replay that enables realistic reproduction of a real workload is synchronization. It is a mechanism that enforces specific ordering on the replayed requests that comprise the workload. It affects the level of request concurrency and the consistency of the replay results when compared
2011 IEEE Symposium on Security and Privacy Memoir: Practical State Continuity for Protected Modules
"... Abstract—To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This requires more than just preserving state confidentiality and integrity, since, e.g., software may err if its state is rolled back to ..."
Abstract
- Add to MetaCart
to ensure rollback resistance without making the system vulnerable to system crashes. It does this by using a deterministic module, storing a concise summary of the module’s request history in protected NVRAM, and allowing only safe request replays after crashes. Since frequent NVRAM writes are impractical
Results 1 - 10
of
749