Sciweavers

264 search results - page 32 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
TDSC
2010
119views more  TDSC 2010»
13 years 2 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
PLDI
2012
ACM
11 years 10 months ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
COMPSAC
2002
IEEE
14 years 23 days ago
Private Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Erica Y. Yang, Jie Xu, Keith H. Bennett
LCR
2000
Springer
172views System Software» more  LCR 2000»
13 years 11 months ago
Achieving Robust, Scalable Cluster I/O in Java
We present Tigris, a high-performance computation and I/O substrate for clusters of workstations that is implemented entirely in Java. Tigris automatically balances resource load a...
Matt Welsh, David E. Culler
LCTRTS
2009
Springer
14 years 2 months ago
A compiler optimization to reduce soft errors in register files
Register file (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing c...
Jongeun Lee, Aviral Shrivastava