Sciweavers

849 search results - page 153 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
CCS
2003
ACM
14 years 24 days ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 11 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 9 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
HPCA
2009
IEEE
14 years 8 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng