Sciweavers

196 search results - page 26 / 40
» Secure in-VM monitoring using hardware virtualization
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 3 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 3 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
14 years 11 days ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
ICCD
2005
IEEE
134views Hardware» more  ICCD 2005»
14 years 5 months ago
Analytical Model for Sensor Placement on Microprocessors
Thermal management in microprocessors has become a major design challenge in recent years. Thermal monitoring through hardware sensors is important, and these sensors must be care...
Kyeong-Jae Lee, Kevin Skadron, Wei Huang
TES
2001
Springer
14 years 1 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...