Sciweavers

754 search results - page 108 / 151
» Can self-managed systems be trusted
Sort
View
ESOP
2001
Springer
14 years 1 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
EUROSYS
2009
ACM
14 years 6 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
WOWMOM
2005
ACM
87views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Reputation Management for Collaborative Content Distribution
We propose a reputation-based trust management system, ROCQ, to reduce inauthentic and corrupted file transfers in end-user collaborative content-distribution systems. Such syste...
Anurag Garg, Roberto G. Cascella
IUI
2003
ACM
14 years 2 months ago
A zero-input interface for leveraging group experience in web browsing
The experience of a trusted group of colleagues can help users improve the quality and focus of their browsing and searching activities. How could a system provide such help, when...
Taly Sharon, Henry Lieberman, Ted Selker
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 9 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch