Sciweavers

1629 search results - page 274 / 326
» Infeasible Code Detection
Sort
View
DSN
2005
IEEE
14 years 3 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ICSM
2005
IEEE
14 years 3 months ago
Object-Oriented Reengineering: Patterns and Techniques
Surprising as it may seem, many of the early adopters of the object-oriented paradigm already face a number of problems typically encountered in large-scale legacy systems. Softwa...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
SP
2005
IEEE
100views Security Privacy» more  SP 2005»
14 years 3 months ago
Polygraph: Automatically Generating Signatures for Polymorphic Worms
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
James Newsome, Brad Karp, Dawn Xiaodong Song
PASTE
2005
ACM
14 years 3 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
UIST
2005
ACM
14 years 3 months ago
PlayAnywhere: a compact interactive tabletop projection-vision system
We introduce PlayAnywhere, a front-projected computer vision-based interactive table system which uses a new commercially available projection technology to obtain a compact, self...
Andrew D. Wilson