Sciweavers

196 search results - page 28 / 40
» Secure in-VM monitoring using hardware virtualization
Sort
View
PLDI
2010
ACM
14 years 1 months ago
Decoupled lifeguards: enabling path optimizations for dynamic correctness checking tools
Dynamic correctness checking tools (a.k.a. lifeguards) can detect a wide array of correctness issues, such as memory, security, and concurrency misbehavior, in unmodified executa...
Olatunji Ruwase, Shimin Chen, Phillip B. Gibbons, ...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
ACSAC
2008
IEEE
14 years 3 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
VEE
2009
ACM
107views Virtualization» more  VEE 2009»
14 years 3 months ago
Architectural support for shadow memory in multiprocessors
Runtime monitoring support serves as a foundation for the important tasks of providing security, performing debugging, and improving performance of applications. Often runtime mon...
Vijay Nagarajan, Rajiv Gupta
ICDE
2006
IEEE
204views Database» more  ICDE 2006»
14 years 2 months ago
AutoGlobe: An Automatic Administration Concept for Service-Oriented Database Applications
Future database application systems will be designed as Service Oriented Architectures (SOAs) like SAP’s NetWeaver instead of monolithic software systems such as SAP’s R/3. Th...
Stefan Seltzsam, Daniel Gmach, Stefan Krompass, Al...