Sciweavers

1448 search results - page 100 / 290
» Restricted Stack Implementations
Sort
View
PADL
1999
Springer
14 years 13 hour ago
CHAT: The Copy-Hybrid Approach to Tabling
The copying approach to tabling (CAT) is an alternative to SLG-WAM and based on incrementally copying the areas that the SLG-WAM freezes to preserve execution states of suspended ...
Bart Demoen, Konstantinos F. Sagonas
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 12 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
SIGCOMM
1994
ACM
13 years 12 months ago
Signaling and Operating System Support for Native-Mode ATM Applications
Applications communicating over connectionless networks, such as IP, cannot obtain per-connection Quality of Service (QoS) guarantees. In contrast, the connection-oriented nature ...
Rosen Sharma, Srinivasan Keshav
CCS
2007
ACM
13 years 11 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...
ACSAC
2004
IEEE
13 years 11 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...