Steven P. Levi
Microsoft
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Steven P. Levi.
european conference on computer systems | 2006
Manuel Fähndrich; Mark Aiken; Chris Hawblitzel; Orion Hodson; Galen C. Hunt; James R. Larus; Steven P. Levi
Message-based communication offers the potential benefits of providing stronger specification and cleaner separation between components. Compared with shared-memory interactions, message passing has the potential disadvantages of more expensive data exchange (no direct sharing) and more complicated programming.In this paper we report on the language, verification, and run-time system features that make messages practical as the sole means of communication between processes in the Singularity operating system. We show that using advanced programming language and verification techniques, it is possible to provide and enforce strong system-wide invariants that enable efficient communication and low-overhead software-based process isolation. Furthermore, specifications on communication channels help in detecting programmer mistakes early---namely at compile-time---thereby reducing the difficulty of the message-based programming model.The paper describes our communication invariants, the language and verification features that support them, as well as implementation details of the infrastructure. A number of benchmarks show the competitiveness of this approach.
european conference on computer systems | 2007
Galen C. Hunt; Mark Aiken; Manuel Fähndrich; Chris Hawblitzel; Orion Hodson; James R. Larus; Steven P. Levi; Bjarne Steensgaard; David Tarditi; Ted Wobber
In most modern operating systems, a process is a hardware-protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms---dynamic code loading, run-time code generation, shared memory, and intrusive system APIs---make the barrier between processes very permeable. This paper argues that this traditional open process architecture exacerbates the dependability and security weaknesses of modern systems. As a remedy, this paper proposes a sealed process architecture, which prohibits dynamic code loading, self-modifying code, shared memory, and limits the scope of the process API. This paper describes the implementation of the sealed process architecture in the Singularity operating system, discusses its merits and drawbacks, and evaluates its effectiveness. Some benefits of this sealed process architecture are: improved program analysis by tools, stronger security and safety guarantees, elimination of redundant overlaps between the OS and language runtimes, and improved software engineering. Conventional wisdom says open processes are required for performance; our experience suggests otherwise. We present the first macrobenchmarks for a sealed-process operating system and applications. The benchmarks show that an experimental sealed-process system can achieve performance competitive with highly-tuned, commercial, open-process systems.
european conference on computer systems | 2006
Michael F. Spear; Tom Roeder; Orion Hodson; Galen C. Hunt; Steven P. Levi
Run-time conflicts can affect even the most rigorously tested software systems. A reliance on execution-based testing makes it prohibitively costly to test every possible interaction among potentially thousands of programs with complex configurations. In order to reduce configuration problems, detect developer errors, and reduce developer effort, we have created a new first class operating system abstraction, the application abstraction, which enables both online and offline reasoning about programs and their configuration requirements.We have implemented a subset of the application abstraction for device drivers in the Singularity operating system. Programmers use the application abstraction by placing declarative statements about hardware and communication requirements within their code. Our design enables Singularity to learn the input/output and interprocess communication requirements of drivers without executing driver code. By reasoning about this information within the domain of Singularitys strong software isolation architecture, the installer can execute a subset the systems resource management algorithm at install time to verify that a new driver will not conflict with existing software. This abstract representation also allows the system to run the full algorithm at driver start time to ensure that there are never resource conflicts between executing drivers, and that drivers never use undeclared resources.
network and operating system support for digital audio and video | 1996
Joseph S. Barrera; Bill Bolosky; Rich Draves; Bob Fitzgerald; Garth A. Gibson; Michael B. Jones; Steven P. Levi; Nathan P. Myhrvold; Rick Rashid
Archive | 1993
Robert P. Fitzgerald; Joseph S. Barrera; William J. Bolosky; Richard P. Draves; Michael B. Jones; Steven P. Levi; Nathan P. Myhrvold; Richard F. Rashid; Garth A. Gibson
Archive | 1995
Michael B. Jones; Paul J. Leach; Richard P. Draves; Joseph S. Barrera; Steven P. Levi; Richard F. Rashid; Robert P. Fitzgerald
U.S. Patent | 2004
Galen C. Hunt; Aamer Hydrie; Robert V. Welland; Bassam Tabbara; Steven P. Levi; Jakob Rehof
ACM Transactions on Storage | 2005
Galen C. Hunt; James R. Larus; Martín Abadi; Mark Aiken; Paul Barham; Manuel Fähndrich; Chris Hawblitzel; Orion Hodson; Steven P. Levi; Nick Murphy; Bjarne Steensgaard; David Tarditi; Ted Wobber; Brian Zill
Archive | 2004
Steven P. Levi; Mark D. Vanantwerp; Craig M. Dowell; Chadd B. Knowlton
Archive | 1995
Michael B. Jones; Paul J. Leach; Richard P. Draves; Joseph S. Barrera; Steven P. Levi; Richard F. Rashid; Robert P. Fitzgerald