Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2023
Charlotte: Reformulating Blockchains into a Web of Composable Attested Data Structures for Cross-Domain Applications
ACM Transactions on Computer Systems (TOCS), Volume 41, Issue 1-4Article No.: 2, Pages 1–52https://doi.org/10.1145/3607534Cross-domain applications are rapidly adopting blockchain techniques for immutability, availability, integrity, and interoperability. However, for most applications, global consensus is unnecessary and may not even provide sufficient guarantees.
We ...
- research-articleOctober 2021
Scaling Membership of Byzantine Consensus
ACM Transactions on Computer Systems (TOCS), Volume 38, Issue 3-4Article No.: 6, Pages 1–31https://doi.org/10.1145/3473138Scaling Byzantine Fault Tolerant (BFT) systems in terms of membership is important for secure applications with large participation such as blockchains. While traditional protocols have low latency, they cannot handle many processors. Conversely, ...
- research-articleJune 2021
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems
ACM Transactions on Computer Systems (TOCS), Volume 37, Issue 1-4Article No.: 6, Pages 1–30https://doi.org/10.1145/3458510Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, ...
- research-articleFebruary 2021
KylinX: Simplified Virtualization Architecture for Specialized Virtual Appliances with Strong Isolation
ACM Transactions on Computer Systems (TOCS), Volume 37, Issue 1-4Article No.: 2, Pages 1–27https://doi.org/10.1145/3436512Unikernel specializes a minimalistic LibOS and a target application into a standalone single-purpose virtual machine (VM) running on a hypervisor, which is referred to as (virtual) appliance. Compared to traditional VMs, Unikernel appliances have ...
-
- research-articleMay 2020
A Retargetable System-level DBT Hypervisor
ACM Transactions on Computer Systems (TOCS), Volume 36, Issue 4Article No.: 14, Pages 1–24https://doi.org/10.1145/3386161System-level Dynamic Binary Translation (DBT) provides the capability to boot an Operating System (OS) and execute programs compiled for an Instruction Set Architecture (ISA) different from that of the host machine. Due to their performance-critical ...
- research-articleDecember 2018
Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data
ACM Transactions on Computer Systems (TOCS), Volume 35, Issue 4Article No.: 13, Pages 1–32https://doi.org/10.1145/3231594Users of modern data-processing services such as tax preparation or genomic screening are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret data while it is processed by services that the data owner does not trust. ...
- research-articleAugust 2015
Shielding Applications from an Untrusted Cloud with Haven
ACM Transactions on Computer Systems (TOCS), Volume 33, Issue 3Article No.: 8, Pages 1–26https://doi.org/10.1145/2799647Today’s cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider’s staff and its globally distributed software/hardware platform not to expose any of their private data.
We introduce the notion of shielded ...
- research-articleMarch 2015
A Differential Approach to Undefined Behavior Detection
ACM Transactions on Computer Systems (TOCS), Volume 33, Issue 1Article No.: 1, Pages 1–29https://doi.org/10.1145/2699678This article studies undefined behavior arising in systems programming languages such as C/C++. Undefined behavior bugs lead to unpredictable and subtle systems behavior, and their effects can be further amplified by compiler optimizations. Undefined ...
- research-articleJune 2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
- William Enck,
- Peter Gilbert,
- Seungyeop Han,
- Vasant Tendulkar,
- Byung-Gon Chun,
- Landon P. Cox,
- Jaeyeon Jung,
- Patrick McDaniel,
- Anmol N. Sheth
ACM Transactions on Computer Systems (TOCS), Volume 32, Issue 2Article No.: 5, Pages 1–29https://doi.org/10.1145/2619091Today’s smartphone operating systems frequently fail to provide users with visibility into how third-party applications collect and share their private data. We address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking ...
- research-articleNovember 2012
Bringing Virtualization to the x86 Architecture with the Original VMware Workstation
ACM Transactions on Computer Systems (TOCS), Volume 30, Issue 4Article No.: 12, Pages 1–51https://doi.org/10.1145/2382553.2382554This article describes the historical context, technical challenges, and main implementation techniques used by VMware Workstation to bring virtualization to the x86 architecture in 1999. Although virtual machine monitors (VMMs) had been around for ...
- research-articleAugust 2012
The Design, Implementation, and Evaluation of Cells: A Virtual Smartphone Architecture
ACM Transactions on Computer Systems (TOCS), Volume 30, Issue 3Article No.: 9, Pages 1–31https://doi.org/10.1145/2324876.2324877Smartphones are increasingly ubiquitous, and many users carry multiple phones to accommodate work, personal, and geographic mobility needs. We present Cells, a virtualization architecture for enabling multiple virtual smartphones to run simultaneously ...
- research-articleJuly 2010
Proactive obfuscation
ACM Transactions on Computer Systems (TOCS), Volume 28, Issue 2Article No.: 4, Pages 1–54https://doi.org/10.1145/1813654.1813655Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh ...
- research-articleDecember 2008
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS), Volume 26, Issue 4Article No.: 9, Pages 1–68https://doi.org/10.1145/1455258.1455259Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the ...
- articleDecember 2007
Labels and event processes in the Asbestos operating system
- Steve Vandebogart,
- Petros Efstathopoulos,
- Eddie Kohler,
- Maxwell Krohn,
- Cliff Frey,
- David Ziegler,
- Frans Kaashoek,
- Robert Morris,
- David Mazières
ACM Transactions on Computer Systems (TOCS), Volume 25, Issue 4Pages 11–eshttps://doi.org/10.1145/1314299.1314302Asbestos, a new operating system, provides novel labeling and isolation mechanisms that help contain the effects of exploitable software flaws. Applications can express a wide range of policies with Asbestos's kernel-enforced labels, including controls ...
- articleFebruary 2006
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS), Volume 24, Issue 1Pages 39–69https://doi.org/10.1145/1124153.1124155TLS is the protocol of choice for securing today's e-commerce and online transactions but adding TLS to a Web server imposes a significant overhead relative to an insecure Web server on the same platform. We perform a comprehensive study of the ...
- articleFebruary 2006
Cryptography as an operating system service: A case study
ACM Transactions on Computer Systems (TOCS), Volume 24, Issue 1Pages 1–38https://doi.org/10.1145/1124153.1124154Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator cards. However, until now no operating system provided a mechanism that ...
- articleFebruary 2005
Backtracking intrusions
ACM Transactions on Computer Systems (TOCS), Volume 23, Issue 1Pages 51–76https://doi.org/10.1145/1047915.1047918Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically ...
- articleAugust 2003
BASE: Using abstraction to improve fault tolerance
ACM Transactions on Computer Systems (TOCS), Volume 21, Issue 3Pages 236–269https://doi.org/10.1145/859716.859718Software errors are a major cause of outages and they are increasingly exploited in malicious attacks. Byzantine fault tolerance allows replicated systems to mask some software errors but it is expensive to deploy. This paper describes a replication ...
- articleMay 2003
Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining
ACM Transactions on Computer Systems (TOCS), Volume 21, Issue 2Pages 164–206https://doi.org/10.1145/762483.762485Scalable management and self-organizational capabilities are emerging as central requirements for a generation of large-scale, highly dynamic, distributed applications. We have developed an entirely new distributed information management system called ...