Sciweavers

724 search results - page 79 / 145
» Implementing Execution Controls in Unix
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
APSCC
2008
IEEE
14 years 2 months ago
Towards Service Supervision for Public Web Services
Public Web services are not designed to be used with specific other Web services in a composite Web service. This leads to the following requirements for the proper control of a ...
Masahiro Tanaka, Yohei Murakami, Toru Ishida
CCS
2005
ACM
14 years 1 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
HRI
2007
ACM
13 years 12 months ago
Learning by demonstration with critique from a human teacher
Learning by demonstration can be a powerful and natural tool for developing robot control policies. That is, instead of tedious hand-coding, a robot may learn a control policy by ...
Brenna Argall, Brett Browning, Manuela M. Veloso
BIRTHDAY
2006
Springer
13 years 12 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle