Sciweavers

60 search results - page 3 / 12
» Microsoft windows programming strategies
Sort
View
HCI
2009
13 years 5 months ago
An Empirical Analysis of Personal Digital Document Structures
Hierarchies have long been used as useful structuring mechanisms for organizing and managing documents. This study looks at the problem of personal digital document management in t...
Sarah Henderson, Ananth Srinivasan
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 7 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
TRUST
2009
Springer
14 years 2 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
DI
2007
81views more  DI 2007»
13 years 7 months ago
Using every part of the buffalo in Windows memory analysis
All Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locatio...
Jesse D. Kornblum
ICSE
2010
IEEE-ACM
13 years 11 months ago
STORM: static unit checking of concurrent programs
Concurrency is inherent in today’s software. Unexpected interactions between concurrently executing threads often cause subtle bugs in concurrent programs. Such bugs are hard to...
Zvonimir Rakamaric