Sciweavers

2269 search results - page 351 / 454
» Behavioral Intrusion Detection
Sort
View
COMPSAC
2009
IEEE
14 years 4 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
ICRA
2009
IEEE
128views Robotics» more  ICRA 2009»
14 years 4 months ago
Tissue property estimation and graphical display for teleoperated robot-assisted surgery
— Palpation of tissue and organs during a surgical procedure provides clinicians with valuable information for diagnosis and surgical planning. In robot-assisted minimally invasi...
Tomonori Yamamoto, Balázs Vágvö...
RAID
2009
Springer
14 years 4 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
DSN
2008
IEEE
14 years 4 months ago
Coverage of a microarchitecture-level fault check regimen in a superscalar processor
Conventional processor fault tolerance based on time/space redundancy is robust but prohibitively expensive for commodity processors. This paper explores an unconventional approac...
Vimal K. Reddy, Eric Rotenberg
RTSS
2008
IEEE
14 years 4 months ago
Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems
COTS peripherals are heavily used in the embedded market, but their unpredictability is a threat for high-criticality real-time systems: it is hard or impossible to formally verif...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Marco...