Sciweavers

29 search results - page 4 / 6
» Preventing Information Leaks through Shadow Executions
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 9 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
CASES
2004
ACM
14 years 27 days ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
WIAS
2010
102views more  WIAS 2010»
13 years 5 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
CVPR
2004
IEEE
14 years 9 months ago
MetaMorphs: Deformable Shape and Texture Models
We present a new class of deformable models, MetaMorphs, whose formulation integrates both shape and interior texture. The model deformations are derived from both boundary and re...
Xiaolei Huang, Dimitris N. Metaxas, Ting Chen
OOPSLA
2005
Springer
14 years 28 days ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....