Sciweavers

1528 search results - page 223 / 306
» Performance Assertion Checking
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
14 years 3 months ago
Compositional design of isochronous systems
The synchronous modeling paradigm provides strong execution correctness guarantees to embedded system design while making minimal environmental assumptions. In most related framew...
Jean-Pierre Talpin, Julien Ouy, Loïc Besnard,...
DATE
2008
IEEE
62views Hardware» more  DATE 2008»
14 years 3 months ago
Instruction Cache Energy Saving Through Compiler Way-Placement
Fetching instructions from a set-associative cache in an embedded processor can consume a large amount of energy due to the tag checks performed. Recent proposals to address this ...
Timothy M. Jones, Sandro Bartolini, Bruno De Bus, ...
ICC
2008
IEEE
176views Communications» more  ICC 2008»
14 years 3 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
ICDCS
2008
IEEE
14 years 3 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...