Despite the ever increasing popularity of handheld, networked gaming consoles, fully interactive real-time, multiplayer games designed for these platforms have yet to become a rea...
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
We present a new technique, path slicing, that takes as input a possibly infeasible path to a target location, and eliminates all the operations that are irrelevant towards the re...
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...