Sciweavers

536 search results - page 7 / 108
» Deconstructing process isolation
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
NDSS
2005
IEEE
14 years 2 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
IFIP
2004
Springer
14 years 1 months ago
New-HOPLA: A Higher-order Process Language with Name Generation
Abstract This paper introduces new-HOPLA, a concise but powerful language for higherorder nondeterministic processes with name generation. Its origins as a metalanguage for domain ...
Glynn Winskel, Francesco Zappa Nardelli
ACSAC
2007
IEEE
14 years 2 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
ICRA
2002
IEEE
103views Robotics» more  ICRA 2002»
14 years 1 months ago
Spreading and Isolating Multiple Stacked Cards using Absorptive Hole Array
A new approach to the separation of multiple stacked cards is presented. Separation of multiple stacked cards is a key operation in many mechatronic devices such as copy machines ...
Shinichi Hirai, Masamitsu Ukai, Ken Yamada, Koji S...