A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
In this paper, we report the advantage of using AC actuating signal for driving MEMS actuators instead of DC voltages. The study is based upon micro mirror devices used in digital...
Henri Camon, C. Ganibal, N. Rapahoz, M. Trzmiel, C...
Power has become the most critical design constraint for embedded handheld devices. This paper proposes a power-efficient SIMD architecture, referred to as Diet SODA, for DSP appl...
Sangwon Seo, Ronald G. Dreslinski, Mark Woh, Chait...
The rate of speciation is in most mammals an order of magnitude faster than in most other vertebrates. It is faster still in the social mammals. The apparent association between c...
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...