Sciweavers

94 search results - page 14 / 19
» Can I Add a Secure VoIP Call
Sort
View
ICFP
2010
ACM
13 years 7 months ago
A certified framework for compiling and executing garbage-collected languages
We describe the design, implementation, and use of a machinecertified framework for correct compilation and execution of programs in garbage-collected languages. Our framework ext...
Andrew McCreight, Tim Chevalier, Andrew P. Tolmach
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
GLOBECOM
2007
IEEE
14 years 1 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
SMC
2007
IEEE
150views Control Systems» more  SMC 2007»
14 years 1 months ago
An intelligent knowledge sharing system for web communities
— This paper presents the prototype of an expert peering system for information exchange in the knowledge society. Our system realizes an intelligent, real-time search engine for...
Christian Bauckhage, Tansu Alpcan, Sachin Agarwal,...
ASPLOS
2009
ACM
13 years 11 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou