Sciweavers

533 search results - page 15 / 107
» Control flow based obfuscation
Sort
View
151
Voted
JCS
2008
124views more  JCS 2008»
15 years 2 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
PDPTA
2004
15 years 3 months ago
A Case for Queue-to-Queue, Back-Pressure-Based Congestion Control for Grid Networks
Standard "new-Reno" TCP faces some performance limitations in very high throughput IP WAN networks, (e.g., computing grids) due to a long end-to-end congestion feedback l...
Marc Herbert, Pascale Vicat-Blanc Primet
124
Voted
INFOCOM
1999
IEEE
15 years 6 months ago
A Time-Scale Decomposition Approach to Measurement-Based Admission Control
We propose a time-scale decomposition approach to measurement-based admission control (MBAC). We identify a critical time scale such that: 1) aggregate traffic fluctuation slower t...
Matthias Grossglauser, David N. C. Tse
CNSR
2004
IEEE
131views Communications» more  CNSR 2004»
15 years 6 months ago
Fast Flow Classification over Internet
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the...
A. Oveissian, Kavé Salamatian, Augustin Sou...
ACSAC
2007
IEEE
15 years 8 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...