- Sponsor:
- sigops
Welcome to the 19th SOSP, and to the beautiful Adirondack mountains of New York State! Larry Peterson and his committee have put together a strong and varied technical program, showcasing the most significant and influential work in operating systems today. Other program highlights include the poster and work-in-progress sessions, the Anita Borg luncheon and the evening banquet on Monday, and the SIGOPS business meeting Tuesday evening. The banquet will include presentation of the third annual Mark Weiser award, and eulogies for Roger Needham and Anita Borg, both of whom were lost to us this year. The business meeting will include presentation of awards in the first-ever SIGOPS division of the ACM Student Research Competition (SRC).Entrants in the SRC include all the regular papers and posters on which a student is principal author. To help to put the competition on an equal footing, four poster finalists will be making formal presentations during the session on Monday afternoon. Many thanks to Kevin Jeffay and his subcommittee for organizing the poster session and judging the submissions, and to Ann Sobel for her help in bringing SIGOPS into the SRC.Continuing the tradition of past SOSPs, we have encouraged student attendance through reduced registration fees and a strong program of financial scholarships. Generous support for this program has come from Microsoft via the SRC, from the National Science Foundation (CISE CCR), from Hewlett-Packard Labs, and from SIGOPS itself. Thanks to Cary Gray and his scholarship committee (John Carter, Norm Hutchinson, Marc Shapiro, and Bob Wisniewski) for their outstanding work under very tight time constraints.
Proceeding Downloads
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to communicate. New transport protocols are written in a type-safe version of C, ...
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a concise high-level model of its security-relevant behavior. This model ...
Preserving peer replicas by rate-limited sampled voting
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches ...
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming any kind of pre-existing administrative relationship. The traditional ...
Performance debugging for distributed systems of black boxes
Many interesting large-scale systems are distributed systems of multiple communicating components. Such systems can be very hard to debug, especially when they exhibit poor performance. The problem becomes much harder when systems are composed of "black-...
Transforming policies into mechanisms with infokernel
- Andrea C. Arpaci-Dusseau,
- Remzi H. Arpaci-Dusseau,
- Nathan C. Burnett,
- Timothy E. Denehy,
- Thomas J. Engle,
- Haryadi S. Gunawi,
- James A. Nugent,
- Florentina I. Popovici
We describe an evolutionary path that allows operating systems to be used in a more flexible and appropriate manner by higher-level services. An infokernel exposes key pieces of information about its algorithms and internal state; thus, its default ...
User-level internet path diagnosis
Diagnosing faults in the Internet is arduous and time-consuming, in part because the network is composed of diverse components spread across many administrative domains. We consider an extreme form of this problem: can end users, with no special ...
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement mechanism. Prior solutions to this problem require centralized ...
SHARP: an architecture for secure resource peering
This paper presents Sharp, a framework for secure distributed resource management in an Internet-scale computing infrastructure. The cornerstone of Sharp is a construct to represent cryptographically protected resource <it>claims</it>---promises or ...
Energy-efficient soft real-time CPU scheduling for mobile multimedia systems
This paper presents GRACE-OS, an energy-efficient soft real-time CPU scheduler for mobile devices that primarily run multimedia applications. The major goal of GRACE-OS is to support application quality of service and save energy. To achieve this goal, ...
Xen and the art of virtualization
- Paul Barham,
- Boris Dragovic,
- Keir Fraser,
- Steven Hand,
- Tim Harris,
- Alex Ho,
- Rolf Neugebauer,
- Ian Pratt,
- Andrew Warfield
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100% binary compatibility at the expense of ...
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing "trusted computing platforms" using hardware~---~TCPA and Palladium being the most publicly visible examples. In this paper we discuss our experience with building such a platform using a ...
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, ...
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example, drivers account for 85% of recently reported failures. This paper ...
Backtracking intrusions
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically ...
RacerX: effective, static detection of race conditions and deadlocks
This paper describes RacerX, a static tool that uses flow-sensitive, interprocedural analysis to detect both race conditions and deadlocks. It is explicitly designed to find errors in large, complex multithreaded systems. It aggressively infers checking ...
Separating agreement from execution for byzantine fault tolerant services
We describe a new architecture for Byzantine fault tolerant state machine replication that separates agreement that orders requests from execution that processes requests. This separation yields two fundamental and practically significant advantages ...
Capriccio: scalable threads for internet services
This paper presents Capriccio, a scalable thread package for use with high-concurrency servers. While recent work has advocated event-based systems, we believe that thread-based systems can provide a simpler programming model that achieves equivalent or ...
Bullet: high bandwidth data dissemination using an overlay mesh
In recent years, overlay networks have become an effective alternative to IP multicast for efficient point to multipoint communication across the Internet. Typically, nodes self-organize with the goal of forming an efficient overlay tree, one that meets ...
SplitStream: high-bandwidth multicast in cooperative environments
In tree-based multicast systems, a relatively small number of interior nodes carry the load of forwarding multicast messages. This works well when the interior nodes are highly-available, dedicated infrastructure routers but it poses a problem for ...
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that drive them. By doing so, we seek to increase our understanding of P2P file ...