Results 1 - 10
of
247
The SLAM project: debugging system software via static analysis
- SIGPLAN Not
"... Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two un ..."
Abstract
-
Cited by 472 (17 self)
- Add to MetaCart
and automated deduction.}V ~ have successfully applied the SLAM toolkit to Windows XP device drivers, to both validate behavior and find defects in their usage of kernel APIs. Context. Today, many programmers are realizing the benefits of using languages with static type systems. By providing
Automatic predicate abstraction of C programs
- IN PROC. ACM PLDI
, 2001
"... Model checking has been widely successful in validating and debugging designs in the hardware and protocol domains. However, state-space explosion limits the applicability of model checking tools, so model checkers typically operate on abstractions of systems. Recently, there has been significant in ..."
Abstract
-
Cited by 488 (33 self)
- Add to MetaCart
variety of problems, ranging from checking that list-manipulating code preserves heap invariants to finding errors in Windows NT device drivers.
Automatically validating temporal safety properties of interfaces
, 2001
"... We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property. The pro ..."
Abstract
-
Cited by 433 (21 self)
- Add to MetaCart
. The process is realized in the SLAM toolkit, which consists of a model checker, predicate abstraction tool and predicate discovery tool. We have applied the SLAM toolkit to a number of Windows NT device drivers to validate critical safety properties such as correct locking behavior. We have found
Enforcing High-Level Protocols in Low-Level Software
, 2001
"... The reliability of infrastructure software, such as operating systems and web servers, is often hampered by the mismanagement of resources, such as memory and network connections. The Vault programming language allows a programmer to describe resource management protocols that the compiler can stati ..."
Abstract
-
Cited by 382 (9 self)
- Add to MetaCart
protocols present in the interface between the Windows 2000 kernel and its device drivers.
Improving the reliability of commodity operating systems
, 2003
"... drivers remain a significant cause of system failures. In Windows XP, for example, drivers account for 85 % of recently reported failures. This article describes Nooks, a reliability subsystem that seeks to greatly enhance operating system (OS) reliability by isolating the OS from driver failures. T ..."
Abstract
-
Cited by 317 (14 self)
- Add to MetaCart
drivers remain a significant cause of system failures. In Windows XP, for example, drivers account for 85 % of recently reported failures. This article describes Nooks, a reliability subsystem that seeks to greatly enhance operating system (OS) reliability by isolating the OS from driver failures
Windows XP kernel crash analysis
- in Proceedings of the 2006 Large Installation System Administration Conference, 2006
, 2006
"... PC users have started viewing crashes as a fact of life rather than a problem. To improve operating system dependability, systems designers and programmers must analyze and understand failure data. In this paper, we analyze Windows XP kernel crash data collected from a population of volunteers who c ..."
Abstract
-
Cited by 51 (0 self)
- Add to MetaCart
PC users have started viewing crashes as a fact of life rather than a problem. To improve operating system dependability, systems designers and programmers must analyze and understand failure data. In this paper, we analyze Windows XP kernel crash data collected from a population of volunteers who
Stateful Fuzzing of Wireless Device Drivers in an Emulated Environment
"... This paper documents the process of identifying potential vulnerabilities in IEEE 802.11 device drivers through fuzzing. The relative complexity of 802.11 as compared to other layer two protocols imposes a number of non-trivial requirements on regular 802.11 protocol fuzzers. This paper describes a ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
of fuzzing the Atheros Windows XP driver, as well as the official and open source MADWifi drivers.
Comparison of the Linux and Windows Device Driver Architectures
"... In this paper the device driver architectures currently used by two of the most popular operating systems, Linux and Microsoft’s Windows, are examined. Driver components required when implementing device drivers for each operating system are presented and compared. The process of implementing a driv ..."
Abstract
- Add to MetaCart
In this paper the device driver architectures currently used by two of the most popular operating systems, Linux and Microsoft’s Windows, are examined. Driver components required when implementing device drivers for each operating system are presented and compared. The process of implementing a
A Comparison of the Linux and Windows Device Driver Architectures
"... Abstract: In this paper the device driver architectures currently used by two of the most popular operating systems, Linux and Microsoft’s Windows, are examined. Driver components required when implementing device drivers for each operating system are presented and compared. The process of implement ..."
Abstract
- Add to MetaCart
Abstract: In this paper the device driver architectures currently used by two of the most popular operating systems, Linux and Microsoft’s Windows, are examined. Driver components required when implementing device drivers for each operating system are presented and compared. The process
Results 1 - 10
of
247