In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
GPGPUs have recently emerged as powerful vehicles for generalpurpose high-performance computing. Although a new Compute Unified Device Architecture (CUDA) programming model from N...
We present an end-to-end tool-chain for model-based design and analysis of component-based embedded realtime software, with Avionics Mission Computing as an application domain. Th...
Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Sh...
The last years have shown that there is no way to disregard the advantages provided by multiprocessor System-on-Chip (MPSoC) architectures in the embedded systems domain. Using mu...
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...