skip to main content
10.1145/945445acmconferencesBook PagePublication PagessospConference Proceedingsconference-collections
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SOSP03: ACM Symposium on Operating Systems Principles Bolton Landing NY USA October 19 - 22, 2003
ISBN:
978-1-58113-757-6
Published:
19 October 2003
Sponsors:
Next Conference
November 5 - 8, 2024
Austin , TX , USA
Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 19th SOSP, and to the beautiful Adirondack mountains of New York State! Larry Peterson and his committee have put together a strong and varied technical program, showcasing the most significant and influential work in operating systems today. Other program highlights include the poster and work-in-progress sessions, the Anita Borg luncheon and the evening banquet on Monday, and the SIGOPS business meeting Tuesday evening. The banquet will include presentation of the third annual Mark Weiser award, and eulogies for Roger Needham and Anita Borg, both of whom were lost to us this year. The business meeting will include presentation of awards in the first-ever SIGOPS division of the ACM Student Research Competition (SRC).Entrants in the SRC include all the regular papers and posters on which a student is principal author. To help to put the competition on an equal footing, four poster finalists will be making formal presentations during the session on Monday afternoon. Many thanks to Kevin Jeffay and his subcommittee for organizing the poster session and judging the submissions, and to Ann Sobel for her help in bringing SIGOPS into the SRC.Continuing the tradition of past SOSPs, we have encouraged student attendance through reduced registration fees and a strong program of financial scholarships. Generous support for this program has come from Microsoft via the SRC, from the National Science Foundation (CISE CCR), from Hewlett-Packard Labs, and from SIGOPS itself. Thanks to Cary Gray and his scholarship committee (John Carter, Norm Hutchinson, Marc Shapiro, and Bob Wisniewski) for their outstanding work under very tight time constraints.

Skip Table Of Content Section
SESSION: Safely executing untrusted code
Article
Upgrading transport protocols using untrusted mobile code

In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to communicate. New transport protocols are written in a type-safe version of C, ...

Article
Model-carrying code: a practical approach for safe execution of untrusted applications

This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a concise high-level model of its security-relevant behavior. This model ...

SESSION: File and storage systems
Article
The Google file system
Article
Preserving peer replicas by rate-limited sampled voting

The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches ...

Article
Decentralized user authentication in a global file system

The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming any kind of pre-existing administrative relationship. The traditional ...

SESSION: Probing the black box
Article
Performance debugging for distributed systems of black boxes

Many interesting large-scale systems are distributed systems of multiple communicating components. Such systems can be very hard to debug, especially when they exhibit poor performance. The problem becomes much harder when systems are composed of "black-...

Article
Transforming policies into mechanisms with infokernel

We describe an evolutionary path that allows operating systems to be used in a more flexible and appropriate manner by higher-level services. An infokernel exposes key pieces of information about its algorithms and internal state; thus, its default ...

Article
User-level internet path diagnosis

Diagnosing faults in the Internet is arduous and time-consuming, in part because the network is composed of diverse components spread across many administrative domains. We consider an extreme form of this problem: can end users, with no special ...

SESSION: Scheduling and resource allocation
Article
Samsara: honor among thieves in peer-to-peer storage

Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement mechanism. Prior solutions to this problem require centralized ...

Article
SHARP: an architecture for secure resource peering

This paper presents Sharp, a framework for secure distributed resource management in an Internet-scale computing infrastructure. The cornerstone of Sharp is a construct to represent cryptographically protected resource <it>claims</it>---promises or ...

Article
Energy-efficient soft real-time CPU scheduling for mobile multimedia systems

This paper presents GRACE-OS, an energy-efficient soft real-time CPU scheduler for mobile devices that primarily run multimedia applications. The major goal of GRACE-OS is to support application quality of service and save energy. To achieve this goal, ...

SESSION: Virtual machine monitors
Article
Xen and the art of virtualization

Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100% binary compatibility at the expense of ...

Article
Implementing an untrusted operating system on trusted hardware

Recently, there has been considerable interest in providing "trusted computing platforms" using hardware~---~TCPA and Palladium being the most publicly visible examples. In this paper we discuss our experience with building such a platform using a ...

Article
Terra: a virtual machine-based platform for trusted computing

We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, ...

SESSION: Making operating systems more robust
Article
Improving the reliability of commodity operating systems

Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example, drivers account for 85% of recently reported failures. This paper ...

Article
Backtracking intrusions

Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically ...

Article
RacerX: effective, static detection of race conditions and deadlocks

This paper describes RacerX, a static tool that uses flow-sensitive, interprocedural analysis to detect both race conditions and deadlocks. It is explicitly designed to find errors in large, complex multithreaded systems. It aggressively infers checking ...

SESSION: Revising old friends
Article
Separating agreement from execution for byzantine fault tolerant services

We describe a new architecture for Byzantine fault tolerant state machine replication that separates agreement that orders requests from execution that processes requests. This separation yields two fundamental and practically significant advantages ...

Article
Capriccio: scalable threads for internet services

This paper presents Capriccio, a scalable thread package for use with high-concurrency servers. While recent work has advocated event-based systems, we believe that thread-based systems can provide a simpler programming model that achieves equivalent or ...

SESSION: Overlay & peer-to-peer networks
Article
Bullet: high bandwidth data dissemination using an overlay mesh

In recent years, overlay networks have become an effective alternative to IP multicast for efficient point to multipoint communication across the Internet. Typically, nodes self-organize with the goal of forming an efficient overlay tree, one that meets ...

Article
SplitStream: high-bandwidth multicast in cooperative environments

In tree-based multicast systems, a relatively small number of interior nodes carry the load of forwarding multicast messages. This works well when the interior nodes are highly-available, dedicated infrastructure routers but it poses a problem for ...

Article
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload

Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that drive them. By doing so, we seek to increase our understanding of P2P file ...

Contributors
  • University of Rochester
  • Princeton University

Recommendations

Acceptance Rates

SOSP '03 Paper Acceptance Rate22of128submissions,17%Overall Acceptance Rate131of716submissions,18%
YearSubmittedAcceptedRate
SOSP '232324319%
SOSP '151813017%
SOSP '031282217%
SOSP '01851720%
SOSP '99901921%
Overall71613118%