Sciweavers

986 search results - page 79 / 198
» Protecting the Intranet Against
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
CCS
2011
ACM
12 years 9 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
DCC
2004
IEEE
14 years 8 months ago
On a Class of Traceability Codes
Traceability codes are designed to be used in schemes that protect copyrighted digital data against piracy. The main aim of this paper is to give an answer to a Staddon-Stinson-We...
Tran van Trung, Sosina Martirosyan
NAS
2009
IEEE
14 years 4 months ago
Reliable Lightpath Routing in Optical Mesh Networks under Multiple Link Failures
- In this work, we study the problem of maximizing lightpath reliability in optical mesh networks against simultaneous failures of multiple fiber links without using protection sch...
Shengli Yuan
QEST
2008
IEEE
14 years 3 months ago
ProbDiVinE-MC: Multi-core LTL Model Checker for Probabilistic Systems
We present a new version of PROBDIVINE – a parallel tool for verification of probabilistic systems against properties formulated in linear temporal logic. Unlike the previous r...
Jiri Barnat, Lubos Brim, Ivana Cerná, Milan...