Sciweavers

67 search results - page 6 / 14
» Runtime Execution Monitoring (REM) to Detect and Prevent Mal...
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention
—Attacks on software systems are an increasingly serious problem from an economic and security standpoint. Many techniques have been proposed ranging from simple compiler modifi...
Jesse Sathre, Alex Baumgarten, Joseph Zambreno
IEEEARES
2009
IEEE
14 years 3 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
CN
2007
133views more  CN 2007»
13 years 8 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
CACM
2010
121views more  CACM 2010»
13 years 6 months ago
Goldilocks: a race-aware Java runtime
We present Goldilocks, a Java runtime that monitors program executions and throws a DataRaceException when a data race is about to occur. This prevents racy accesses from taking p...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran
LCTRTS
2000
Springer
14 years 4 days ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross