Sciweavers

325 search results - page 55 / 65
» Patterns for Secure Boot and Secure Storage in Computer Syst...
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
OSDI
2006
ACM
14 years 7 months ago
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management
Mismanagement of the persistent state of a system--all the executable files, configuration settings and other data that govern how a system functions--causes reliability problems,...
Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Bra...
EGC
2005
Springer
14 years 1 months ago
HotGrid: Graduated Access to Grid-Based Science Gateways
Abstract. We describe the idea of a Science Gateway, an applicationspeciļ¬c task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...
Roy Williams, Conrad Steenberg, Julian J. Bunn
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
13 years 11 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...