Sciweavers

183 search results - page 34 / 37
» Software Protection Through Dynamic Code Mutation
Sort
View
MOBISYS
2008
ACM
14 years 10 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
TASE
2011
IEEE
13 years 5 months ago
A Totally Decoupled Piezo-Driven XYZ Flexure Parallel Micropositioning Stage for Micro/Nanomanipulation
—This paper reports the design and development processes of a totally decoupled flexure-based XYZ parallel-kinematics micropositioning stage with piezoelectric actuation. The un...
Yangmin Li, Qingsong Xu
SOSP
2003
ACM
14 years 7 months ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy
WWW
2010
ACM
14 years 5 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
DSN
2009
IEEE
14 years 5 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....