Sciweavers

533 search results - page 28 / 107
» Control flow based obfuscation
Sort
View
107
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
115
Voted
INFOCOM
2003
IEEE
15 years 7 months ago
Stability and Convergence of TCP-like Congestion Controllers in a Many-Flows Regime
— With the rapid growth of Internet, parameter design and analysis for large-scale networks has become a topic of active interest. Since simulation of such large scale systems is...
Supratim Deb, Sanjay Shakkottai, R. Srikant
TON
1998
93views more  TON 1998»
15 years 2 months ago
An evaluation of flow control in group communication
Abstract— Group communication services have been successfully used to construct applications with high availability, dependability, and real-time responsiveness requirements. Flo...
Shivakant Mishra, Lei Wu
MONET
2008
127views more  MONET 2008»
15 years 2 months ago
Provisioning of Parameterized Quality of Service in 802.11e Based Wireless Mesh Networks
There has been a growing interest in the use of wireless mesh networks. Today's wireless technology enables very high data rate up to hundreds of Megabits per second, which c...
Xiaowen Chu
124
Voted
IMC
2005
ACM
15 years 8 months ago
The Power of Slicing in Internet Flow Measurement
Flow measurement evolved into the primary method for measuring the composition of Internet traffic. Large ISPs and small networks use it to track dominant applications, dominant ...
Ramana Rao Kompella, Cristian Estan