Sciweavers

19 search results - page 3 / 4
» Detection and Prediction of Resource-Exhaustion Vulnerabilit...
Sort
View
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
13 years 12 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
ACSAC
2010
IEEE
13 years 4 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
ASPLOS
2012
ACM
12 years 3 months ago
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults
Future microprocessors need low-cost solutions for reliable operation in the presence of failure-prone devices. A promising approach is to detect hardware faults by deploying low-...
Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naei...
CF
2004
ACM
14 years 27 days ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
WIDM
2005
ACM
14 years 1 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...