Sciweavers

87 search results - page 5 / 18
» Implementing virtual secure circuit using a custom-instructi...
Sort
View
USS
2008
13 years 10 months ago
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and "escape" into the Internet. Due to this security concern, ...
Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar
CCS
2008
ACM
13 years 9 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 1 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
IACR
2011
115views more  IACR 2011»
12 years 7 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
ISRR
2005
Springer
130views Robotics» more  ISRR 2005»
14 years 1 months ago
Wave Haptics: Encoderless Virtual Stiffnesses
Haptic rendering commonly implements virtual springs using DC motors with current amplifiers and encoder-based position feedback. In these schemes, quantization, discretization, ...
Günter Niemeyer, Nicola Diolaiti, Neal A. Tan...