Sciweavers

1377 search results - page 111 / 276
» Flit-Reservation Flow Control
Sort
View
109
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
111
Voted
CC
2007
Springer
15 years 8 months ago
Correcting the Dynamic Call Graph Using Control-Flow Constraints
Abstract. To reason about programs, dynamic optimizers and analysis tools use sampling to collect a dynamic call graph (DCG). However, sampling has not achieved high accuracy with ...
Byeongcheol Lee, Kevin Resnick, Michael D. Bond, K...
DRM
2005
Springer
15 years 8 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
117
Voted
INFOCOM
2003
IEEE
15 years 7 months ago
Stability and Convergence of TCP-like Congestion Controllers in a Many-Flows Regime
— With the rapid growth of Internet, parameter design and analysis for large-scale networks has become a topic of active interest. Since simulation of such large scale systems is...
Supratim Deb, Sanjay Shakkottai, R. Srikant
130
Voted
DFT
2006
IEEE
130views VLSI» more  DFT 2006»
15 years 8 months ago
Off-Chip Control Flow Checking of On-Chip Processor-Cache Instruction Stream
Control flow checking (CFC) is a well known concurrent checking technique for ensuring that a program’s instruction execution sequence follows permissible paths. Almost all CFC...
Federico Rota, Shantanu Dutt, Sahithi Krishna