scispace - formally typeset
A

Arash Baratloo

Researcher at Courant Institute of Mathematical Sciences

Publications -  13
Citations -  993

Arash Baratloo is an academic researcher from Courant Institute of Mathematical Sciences. The author has contributed to research in topics: Metacomputing & Java. The author has an hindex of 9, co-authored 13 publications receiving 988 citations. Previous affiliations of Arash Baratloo include Alcatel-Lucent & New York University.

Papers
More filters
Proceedings Article

Transparent run-time defense against stack smashing attacks

TL;DR: Two new methods to detect and handle buffer overflow vulnerabilities in process stacks are presented that work with any existing pre-compiled executable and can be used transparently per-process as well as on a system-wide basis.
Journal ArticleDOI

Charlotte: metacomputing on the Web

TL;DR: A system which enables application programmers to write parallel programs in Java and allows Java-capable browsers to execute parallel tasks is presented, which comprises a virtual machine model which isolates the program from the execution environment, and a runtime system realizing this virtual machine on the Web.
Proceedings ArticleDOI

CALYPSO: a novel software system for fault-tolerant parallel processing on distributed platforms

TL;DR: CALYPSO is a prototype software system for writing and executing parallel programs on non-dedicated platforms, based on COTS networked workstations operating systems, and compilers, with among notable properties a simple programming paradigm incorporating shared memory constructs and separating the programming and the execution parallelism.
Patent

Data image management via emulation of non-volatile storage device

TL;DR: In this paper, a data image management system (DIMS) that includes a local data image manager (LDIM), a Remote Data Image Manager (RDIM), and a remote persistent storage device (RPSD) is described.

Libsafe: Protecting Critical Elements of Stacks

TL;DR: A new method to detect and handle buffer overflow vulnerabilities in stack stacks is presented, which works with any existing pre-compiled executable and can be used transparently, even on a system-wide basis.