Sciweavers

264 search results - page 25 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ICON
2007
IEEE
14 years 2 months ago
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
-- This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer s...
Hongxun Liu, José G. Delgado-Frias, Sirisha...
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
14 years 27 days ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
IOLTS
2006
IEEE
100views Hardware» more  IOLTS 2006»
14 years 1 months ago
A Note on Error Detection in an RSA Architecture by Means of Residue Codes
Recently, various attacks have been proposed against many cryptosystems, exploiting deliberate error injection during the computation process. In this paper, we add a residue-base...
Luca Breveglieri, Paolo Maistri, Israel Koren