ACM Transactions on Computer Systems (TOCS)
Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Coda: A Highly Available File System for a Distributed Workstation Environment
IEEE Transactions on Computers
Disconnected operation in the Coda File System
ACM Transactions on Computer Systems (TOCS)
Transparently interposing user code at the system interface
Transparently interposing user code at the system interface
TENEX, a paged time sharing system for the PDP - 10
Communications of the ACM
Accent: A communication oriented network operating system kernel
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
ITS 1.5 Reference Manual
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
UFO: a personal global file system based on user-level extensions to the operating system
ACM Transactions on Computer Systems (TOCS)
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
CTK: Configurable Object Abstractions for Multiprocessors
IEEE Transactions on Software Engineering
History-based access control for mobile code
Secure Internet programming
On providing support for protocol adaptation in mobile wireless networks
Mobile Networks and Applications - ACM/Kluwer special issue on wireless internet and intranet access
Information and control in gray-box systems
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Towards safe and efficient customization in distributed systems
EW 6 Proceedings of the 6th workshop on ACM SIGOPS European workshop: Matching operating systems to application needs
An infrastructure for application-specific customization
EW 6 Proceedings of the 6th workshop on ACM SIGOPS European workshop: Matching operating systems to application needs
Interposed request routing for scalable network storage
ACM Transactions on Computer Systems (TOCS)
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
Gathering at the well: creating communities for grid I/O
Proceedings of the 2001 ACM/IEEE conference on Supercomputing
Incommunicado: efficient communication for isolates
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Multiple Bypass: Interposition Agents for Distributed Computing
Cluster Computing
Case Studies in Security and Resource Management for Mobile Object Systems
Autonomous Agents and Multi-Agent Systems
Frigate: A User-Extensible OO File System
IEEE Concurrency
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Retargetable and reconfigurable software dynamic translation
Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization
A Configuration Approach for Distributed Object-Oriented System Customization
WORDS '97 Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems - (WORDS '97)
Software Development Kit for Dependable Applications in Embedded
ITC '00 Proceedings of the 2000 IEEE International Test Conference
Predicting Device Performance From Pass/Fail Transient Signal Analysis Data
ITC '00 Proceedings of the 2000 IEEE International Test Conference
A COTS Wrapping Toolkit for Fault Tolerant Applications under Windows NT
IOLTW '00 Proceedings of the 6th IEEE International On-Line Testing Workshop (IOLTW)
Efficient mediators through dynamic code generation: a method and an experiment
Proceedings of the 2003 ACM symposium on Applied computing
Grid-computing portals and security issues
Journal of Parallel and Distributed Computing - Scalable web services and architecture
Stateful distributed interposition
ACM Transactions on Computer Systems (TOCS)
System support for pervasive applications
ACM Transactions on Computer Systems (TOCS)
Identity Boxing: A New Technique for Consistent Global Identity
SC '05 Proceedings of the 2005 ACM/IEEE conference on Supercomputing
WAP5: black-box performance debugging for wide-area systems
Proceedings of the 15th international conference on World Wide Web
A light-weight, collaborative temporary file system for clustered Web servers
Journal of Parallel and Distributed Computing - Special issue: 18th International parallel and distributed processing symposium
Performance prediction of paging workloads using lightweight tracing
Future Generation Computer Systems - Systems performance analysis and evaluation
On incremental file system development
ACM Transactions on Storage (TOS)
Ad hoc extensibility and access control
ACM SIGOPS Operating Systems Review
Extending ACID semantics to the file system
ACM Transactions on Storage (TOS)
Constructing services with interposable virtual hardware
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Explicit control a batch-aware distributed file system
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Interposed request routing for scalable network storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Synthesizing fast intrusion prevention/detection systems from high-level specifications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
TESLA: a transparent, extensible session-layer architecture for end-to-end network services
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Mesh: secure, lightweight grid middleware using existing SSH infrastructure
Proceedings of the 12th ACM symposium on Access control models and technologies
Filesystem daemons as a unifying mechanism for network information access
WTEC'94 Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference
Profiling and tracing dynamic library usage via interposition
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
DITools: application-level support for dynamic extension and flexible composition
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Transparent run-time defense against stack smashing attacks
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Frigate: an object-oriented file system for ordinary users
COOTS'97 Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
SLIC: an extensibility system for commodity operating systems
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Transformer tunnels: a framework for providing route-specific adaptations
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Multiple trace composition and its uses
TCLTK '98 Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3
Extending the operating system at the user level: the Ufo global file system
ATEC '97 Proceedings of the annual conference on USENIX Annual Technical Conference
BrowserShield: Vulnerability-driven filtering of dynamic HTML
ACM Transactions on the Web (TWEB)
Rapid file system development using ptrace
Proceedings of the 2007 workshop on Experimental computer science
Rapid file system development using ptrace
ecs'07 Experimental computer science on Experimental computer science
Towards an active network architecture
ACM SIGCOMM Computer Communication Review
Information flow control for standard OS abstractions
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
BrowserShield: vulnerability-driven filtering of dynamic HTML
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
HERMES: A Software Architecture for Visibility and Control in Wireless Sensor Network Deployments
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Boom analytics: exploring data-centric, declarative programming for the cloud
Proceedings of the 5th European conference on Computer systems
Operating system virtualization: practice and experience
Proceedings of the 3rd Annual Haifa Experimental Systems Conference
A virtual file system interface for computational grids
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Enforcing Murphy's law for advance identification of run-time failures
USENIX ATC'12 Proceedings of the 2012 USENIX conference on Annual Technical Conference
Maintaining high performance communication under least privilege using dynamic perimeter control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Composing OS extensions safely and efficiently with Bascule
Proceedings of the 8th ACM European Conference on Computer Systems
Hi-index | 0.00 |
Many contemporary operating systems utilize a system call interface between the operating system and its clients. Increasing numbers of systems are providing low-level mechanisms for intercepting and handling system calls in user code. Nonetheless, they typically provide no higher-level tools or abstractions for effectively utilizing these mechanisms. Using them has typically required reimplementation of a substantial portion of the system interface from scratch, making the use of such facilities unwieldy at best.This paper presents a toolkit that substantially increases the ease of interposing user code between clients and instances of the system interface by allowing such code to be written in terms of the high-level objects provided by this interface, rather than in terms of the intercepted system calls themselves. This toolkit helps enable new interposition agents to be written, many of which would not otherwise have been attempted.This toolkit has also been used to construct several agents including: system call tracing tools, file reference tracing tools, and customizable filesystem views. Examples of other agents that could be built include: protected environments for running untrusted binaries, logical devices implemented entirely in user space, transparent data compression and/or encryption agents, transactional software environments, and emulators for other operating system environments.