Sciweavers

185 search results - page 26 / 37
» File and Memory Security Analysis for Grid Systems
Sort
View
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
CCS
2006
ACM
13 years 11 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...
PLDI
2003
ACM
14 years 18 days ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
ICITA
2005
IEEE
14 years 29 days ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
AAI
2005
113views more  AAI 2005»
13 years 7 months ago
Analysis and Synthesis of Learning Agent's Communicative Behavior
This paper is about people. It is about understanding how learning and communication mutually influence one another; allowing people to infer each other's communicative behavi...
Nik Nailah Binti Abdullah, Stefano A. Cerri