Sciweavers

32 search results - page 3 / 7
» Does Privacy Require True Randomness
Sort
View
CCS
2004
ACM
14 years 1 months ago
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against bu er over ow attacks. The idea is to introduce arti cial diversity by randomizing the memory location o...
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh...
NIPS
2007
13 years 10 months ago
Compressed Regression
Recent research has studied the role of sparsity in high dimensional regression and signal reconstruction, establishing theoretical limits for recovering sparse models from sparse...
Shuheng Zhou, John D. Lafferty, Larry A. Wasserman
ACSAC
2007
IEEE
14 years 2 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
ICIP
2010
IEEE
13 years 6 months ago
A no-reference image content metric and its application to denoising
A no-reference image metric based on the singular value decomposition of local image gradients is proposed in this paper. This metric provides a quantitative measure of true image...
Xiang Zhu, Peyman Milanfar
ESORICS
2005
Springer
14 years 2 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento