Sciweavers

533 search results - page 30 / 107
» Control flow based obfuscation
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 6 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
JSS
2007
115views more  JSS 2007»
15 years 2 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
SIGMETRICS
2000
ACM
107views Hardware» more  SIGMETRICS 2000»
15 years 6 months ago
Detecting shared congestion of flows via end-to-end measurement
Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flow...
Dan Rubenstein, James F. Kurose, Donald F. Towsley
GLOBECOM
2009
IEEE
15 years 6 months ago
Route Capacity Estimation Based Admission Control and QoS Routing for Mesh Networks
Wireless Mesh Networks (WMNs) is a promising key technology for next generation wireless backhauling that is expected to support various types of applications with different qualit...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
ISSS
1998
IEEE
103views Hardware» more  ISSS 1998»
15 years 6 months ago
False Path Analysis Based on a Hierarchical Control Representation
False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
Apostolos A. Kountouris, Christophe Wolinski