Sciweavers

264 search results - page 51 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 1 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
DRM
2005
Springer
14 years 1 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
SAC
2010
ACM
13 years 8 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel
ASPLOS
2011
ACM
12 years 11 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 9 months ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania