Sciweavers

4731 search results - page 159 / 947
» Securing Interactive Programs
Sort
View
ISCA
2008
IEEE
109views Hardware» more  ISCA 2008»
14 years 3 months ago
Flexible Hardware Acceleration for Instruction-Grain Program Monitoring
Instruction-grain program monitoring tools, which check and analyze executing programs at the granularity of individual instructions, are invaluable for quickly detecting bugs and...
Shimin Chen, Michael Kozuch, Theodoros Strigkos, B...
SIGSOFT
2000
ACM
14 years 1 months ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia
NOMS
2006
IEEE
147views Communications» more  NOMS 2006»
14 years 3 months ago
DiMAPI: An Application Programming Interface for Distributed Network Monitoring
Abstract— Network monitoring and measurement is commonly regarded as an essential function for understanding, managing and improving the performance and security of network infra...
Panos Trimintzios, Michalis Polychronakis, Antonis...
CSREASAM
2010
13 years 5 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
EUC
2005
Springer
14 years 2 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...