Sciweavers

15379 search results - page 102 / 3076
» Protecting users from
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
WISTP
2010
Springer
13 years 5 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
INFOCOM
2010
IEEE
13 years 5 months ago
On the Feasibility and Efficacy of Protection Routing in IP Networks
With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stabi...
Kin Wah Kwong, Lixin Gao, Roch Guérin, Zhi-...
TIP
2010
121views more  TIP 2010»
13 years 2 months ago
Optimal PET Protection for Streaming Scalably Compressed Video Streams With Limited Retransmission Based on Incomplete Feedback
For streaming scalably compressed video streams over unreliable networks, Limited-Retransmission Priority Encoding Transmission (LR-PET) outperforms PET remarkably since the opport...
Ruiqin Xiong, David Taubman, Vijay Sivaraman
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...