Sciweavers

60 search results - page 9 / 12
» Eliminating microarchitectural dependency from Architectural...
Sort
View
DSN
2007
IEEE
14 years 1 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ICDE
2005
IEEE
154views Database» more  ICDE 2005»
14 years 11 months ago
Deep Store: an Archival Storage System Architecture
We present the Deep Store archival storage architecture, a large-scale storage system that stores immutable data efficiently and reliably for long periods of time. Archived data i...
Lawrence You, Kristal T. Pollack, Darrell D. E. Lo...
ICCAD
2005
IEEE
98views Hardware» more  ICCAD 2005»
14 years 3 months ago
An architecture and a wrapper synthesis approach for multi-clock latency-insensitive systems
— This paper presents an architecture and a wrapper synthesis approach for the design of multi-clock systems-on-chips. We build upon the initial work on multi-clock latency-insen...
Ankur Agiwal, Montek Singh
PRDC
2006
IEEE
14 years 3 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...
COMPSAC
2009
IEEE
14 years 4 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...