Sciweavers

133 search results - page 10 / 27
» Securing Systems Against External Programs
Sort
View
HOTOS
2007
IEEE
13 years 11 months ago
Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical
Given that the majority of future processors will contain an abundance of execution cores, redundant execution can offer a promising method for increasing the availability and res...
Jesse Pool, Ian Sin Kwok Wong, David Lie
ACSAC
2002
IEEE
14 years 15 days ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
SOSP
2007
ACM
14 years 4 months ago
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only approved code can execute in kernel mode ove...
Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
14 years 1 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji