Isolating untrusted software extensions by custom scoping rules

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Isolating untrusted software extensions by custom scoping rules

In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an application developer to customize the scoping rules of its underlying language. We demonstrate that such an ability can serve as the cornerstone of a security architecture for dynamically extensible systems. A run-time module s...

متن کامل

Memory Safety and Untrusted Extensions for TinyOS

Sensor network applications should be reliable. However, TinyOS, the dominant sensor net OS, lacks basic building blocks for reliable software systems: memory protection, isolation, and safe termination. These features are typically found in general-purpose operating systems but are believed to be too expensive for tiny embedded systems with a few kilobytes of RAM. We dispel this notion and sho...

متن کامل

Custom and Rules

This comment is part of a symposium on Ekkehart Schlicht, On Custom in the Economy (1998) Oxford: Clarendon Press.

متن کامل

MaxPar Extensions for Isolating Performance Problems

Many applications are too large for easy hand optimization. The Parallel Performance Analyst is a tool for automatically characterizing and identifying the regions of the application most deserving of programmer attention. Among its components are interactive and traced-based prooling tools, and the MaxPar execution-driven simu-lator, which computes the amount of parallelism inherent in a code,...

متن کامل

Proof-Carrying Code with Untrusted Proof Rules

Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In traditional implementations of PCC the producer negotiates beforehand, and in an unspecified way, with the consumer the permission to prove safety in whatever high-level way it chooses. In practice this has meant that highlevel rules for type safety have been hard-wired into th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Languages, Systems & Structures

سال: 2010

ISSN: 1477-8424

DOI: 10.1016/j.cl.2009.12.002