Sciweavers

69 search results - page 8 / 14
» Computational Vulnerability Analysis for Information Surviva...
Sort
View
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 3 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
MICCAI
2005
Springer
14 years 10 months ago
Exploiting Temporal Information in Functional Magnetic Resonance Imaging Brain Data
Functional Magnetic Resonance Imaging(fMRI) has enabled scientists to look into the active human brain, leading to a flood of new data, thus encouraging the development of new data...
Lei Zhang 0002, Dimitris Samaras, Dardo Tomasi, Ne...
JCS
2011
72views more  JCS 2011»
13 years 4 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
CGO
2008
IEEE
14 years 4 months ago
Fast liveness checking for ssa-form programs
Liveness analysis is an important analysis in optimizing compilers. Liveness information is used in several optimizations and is mandatory during the code-generation phase. Two dr...
Benoit Boissinot, Sebastian Hack, Daniel Grund, Be...
JUCS
2006
128views more  JUCS 2006»
13 years 9 months ago
A Web-Based Decision Support System for Chronic Diseases
: Individuals vary in survival chances due to differences in genetics, environmental exposures, and gene-environment interactions. These chances, as well as the contribution of eac...
Chi-Chan Chang, Chuen-Sheng Cheng, Yeu-Shiang Huan...