Sciweavers

724 search results - page 79 / 145
» Implementing Execution Controls in Unix
Sort
View
ACSAC
2008
IEEE
15 years 8 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
APSCC
2008
IEEE
15 years 8 months ago
Towards Service Supervision for Public Web Services
Public Web services are not designed to be used with specific other Web services in a composite Web service. This leads to the following requirements for the proper control of a ...
Masahiro Tanaka, Yohei Murakami, Toru Ishida
CCS
2005
ACM
15 years 7 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
HRI
2007
ACM
15 years 6 months ago
Learning by demonstration with critique from a human teacher
Learning by demonstration can be a powerful and natural tool for developing robot control policies. That is, instead of tedious hand-coding, a robot may learn a control policy by ...
Brenna Argall, Brett Browning, Manuela M. Veloso
BIRTHDAY
2006
Springer
15 years 6 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle