User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Currently providing such features in mobile applications as the sending of lower-bandwidth images when a client device is in a low-bandwidth access area, the business logic to dis...
Frameworks promote design and code reuse, at a higher level of granularity. The use of frameworks is a hard task though, because usually they lack documentation and instructions o...
Abstract. A type-based certifying compiler maps source code to machine code and target-level type annotations. The target-level annotations make it possible to prove easily that th...