Sciweavers

78 search results - page 9 / 16
» Defensive Execution of Transactional Processes against Attac...
Sort
View
ACSAC
2009
IEEE
14 years 1 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
USS
2010
13 years 5 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis
SASO
2007
IEEE
14 years 1 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
SASO
2007
IEEE
14 years 1 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
BIOCOMP
2006
13 years 8 months ago
Petri Net Based Model Of The T Cell Receptor Signaling Pathway
Intracellular signaling pathways as well as the interactions and coordination that exist among them are complex and difficult to visualize and understand. Computer-based models of...
Srinidhi Jayasuryan, Anil Bamezai, Vijay Gehlot