Sciweavers

150 search results - page 10 / 30
» Recovering Digital Evidence from Linux Systems
Sort
View
EUROSYS
2011
ACM
12 years 11 months ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
SOSP
2005
ACM
14 years 4 months ago
Speculative execution in a distributed file system
Speculator provides Linux kernel support for speculative execution. It allows multiple processes to share speculative state by tracking causal dependencies propagated through inte...
Edmund B. Nightingale, Peter M. Chen, Jason Flinn
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
14 years 3 hour ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
IWMM
2000
Springer
78views Hardware» more  IWMM 2000»
13 years 11 months ago
On the Type Accuracy of Garbage Collection
We describe a novel approach to obtaining type-accurate information for garbage collection in a hardware and language independent way. Our approach uses a run-time analysis to pro...
Martin Hirzel, Amer Diwan
CCS
2011
ACM
12 years 7 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...