Sciweavers

82 search results - page 2 / 17
» Privacy-Invasive Software and Preventive Mechanisms
Sort
View
CCS
2007
ACM
14 years 2 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
14 years 1 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
TC
2002
13 years 8 months ago
Designing High Integrity Systems Using Aspects
: In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms requi...
Geri Georg, Robert B. France, Indrakshi Ray
AINA
2009
IEEE
14 years 1 months ago
A New Method of Proactive Recovery Mechanism for Large-Scale Network Failures
—This paper proposes a novel recovery mechanism from large-scale network failures caused by earthquakes, terrorist attacks, large-scale power outages and software bugs. Our metho...
Takuro Horie, Go Hasegawa, Satoshi Kamei, Masayuki...
ACSAC
2010
IEEE
13 years 6 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...