Sciweavers

121 search results - page 21 / 25
» Software Protection through Anti-Debugging
Sort
View
CCS
2010
ACM
13 years 8 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
SIGUCCS
2000
ACM
13 years 11 months ago
Approaches to Computer Lab Management: Lockdown vs. Freedom
Basic approaches to computer lab management range along a spectrum from total lockdown of lab computers to total freedom. Total lockdown, which can be implemented with system perm...
Christopher Jones, Yasemin Tunc, Deborah Cherry
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
SOSP
1997
ACM
13 years 9 months ago
Application Performance and Flexibility on Exokernel Systems
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
CASES
2005
ACM
13 years 10 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...