Sciweavers

2257 search results - page 310 / 452
» Secure program partitioning
Sort
View
DSOM
2004
Springer
14 years 3 months ago
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
Autonomic distributed management enables for deploying self-directed monitoring and control tasks that track dynamic network problems such as performance degradation and security t...
Ehab S. Al-Shaer, Bin Zhang
OOPSLA
2004
Springer
14 years 3 months ago
Advancements in multicode optimization
In previous work, we have shown that multicodes can be used to improve the performance of Java applications. We extend that work by both implementing more multicodes and consideri...
Ben Stephenson, Wade Holst
PPPJ
2003
ACM
14 years 3 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling
CASCON
2006
149views Education» more  CASCON 2006»
13 years 11 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 11 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...