Isolating untrusted software extensions by custom scoping rules
نویسندگان
چکیده
منابع مشابه
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an application developer to customize the scoping rules of its underlying language. We demonstrate that such an ability can serve as the cornerstone of a security architecture for dynamically extensible systems. A run-time module s...
متن کاملMemory Safety and Untrusted Extensions for TinyOS
Sensor network applications should be reliable. However, TinyOS, the dominant sensor net OS, lacks basic building blocks for reliable software systems: memory protection, isolation, and safe termination. These features are typically found in general-purpose operating systems but are believed to be too expensive for tiny embedded systems with a few kilobytes of RAM. We dispel this notion and sho...
متن کاملCustom and Rules
This comment is part of a symposium on Ekkehart Schlicht, On Custom in the Economy (1998) Oxford: Clarendon Press.
متن کاملMaxPar Extensions for Isolating Performance Problems
Many applications are too large for easy hand optimization. The Parallel Performance Analyst is a tool for automatically characterizing and identifying the regions of the application most deserving of programmer attention. Among its components are interactive and traced-based prooling tools, and the MaxPar execution-driven simu-lator, which computes the amount of parallelism inherent in a code,...
متن کاملProof-Carrying Code with Untrusted Proof Rules
Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In traditional implementations of PCC the producer negotiates beforehand, and in an unspecified way, with the consumer the permission to prove safety in whatever high-level way it chooses. In practice this has meant that highlevel rules for type safety have been hard-wired into th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Languages, Systems & Structures
سال: 2010
ISSN: 1477-8424
DOI: 10.1016/j.cl.2009.12.002