Sciweavers

96 search results - page 4 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
DSN
2008
IEEE
14 years 19 days ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
JVM
2004
106views Education» more  JVM 2004»
14 years 7 days ago
Kernel Plugins: When a VM Is Too Much
This paper presents kernel plugins, a framework for dynamic kernel specialization inspired by ideas borrowed from virtualization research. Plugins can be created and updated inexp...
Ivan B. Ganev, Greg Eisenhauer, Karsten Schwan
CCS
2005
ACM
14 years 4 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
APVIS
2008
14 years 9 days ago
Dynamic Shader Generation for Flexible Multi-Volume Visualization
Volume rendering of multiple intersecting volumetric objects is a difficult visualization task, especially if different rendering styles need to be applied to the components, in o...
Friedemann Rößler, Ralf P. Botchen, Tho...
IWMM
2004
Springer
101views Hardware» more  IWMM 2004»
14 years 4 months ago
Exploring the barrier to entry: incremental generational garbage collection for Haskell
We document the design and implementation of a “production” incremental garbage collector for GHC 6.2. It builds on our earlier work (Non-stop Haskell) that exploited GHC’s ...
Andrew M. Cheadle, A. J. Field, Simon Marlow, Simo...