User-level Enforcement of Appropriate Background Process Execution

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High-Level Speculative Execution Based on Predictive User Modeling

Slow response is a bane of human interfaces. Computers often react slowly to commands and queries—sometimes taking longer than measured human attention spans—wasting users’ time and causing frustration and distraction. We might hope the steady improvement in computer hardware would solve this problem, but software is simultaneously becoming larger and more complex. As designers of increasingly ...

متن کامل

A user-Level process package for PVM

This paper describes an approach to supporting efcient processor virtualization and dynamic load balancing for message-based, parallel programs. Specifically, a user-level process package (UPVM) for SPMD-style PVM applications is presented. UPVM supports light-weight virtual processors that are transparently and independently migratable. It also implements a source-code compatible PVM interface...

متن کامل

User-level Process towards Exascale Systems

The process oversubscription, which binds multiple parallel processes to one CPU core, can hide the communication latency and reduce CPU idle time. However, the lightweight OS kernels for Exascale systems may no longer support OS task scheduling. Without OS task scheduling, only one parallel process per CPU core is allowed, and then the process oversubscription is impossible. Even if the OS tas...

متن کامل

Execution monitoring enforcement under memory-limitation constraints

Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is the characterization of security policies that are enforceable by execution monitors constrained by memory limitations. This paper contributes to give more precise answers to this research problem. To represent executi...

متن کامل

Execution Model Enforcement Via Program Shepherding

Nearly all security attacks have one thing in common: they coerce the target program into performing actions that it was never intended to perform. In short, they violate the program’s execution model. The execution model encompasses the Application Binary Interface (ABI), higher-level specifications from the program’s source programming language, and components specific to the program — for ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IPSJ Online Transactions

سال: 2011

ISSN: 1882-6660

DOI: 10.2197/ipsjtrans.4.94