Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
Interruptions are a central characteristic of work in critical environments such as hospitals, airlines, and security agencies. Often, interruptions occur as notifications of some...
Suzanne P. Weisband, Kelly J. Fadel, Elisa Mattare...
This paper presents our experience validating the flood tolerance of two network interface card (NIC)-based embedded firewall solutions, the Embedded Firewall (EFW) and the Autono...
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...