Sciweavers

201 search results - page 40 / 41
» Tools to Support Secure Enterprise Computing
Sort
View
EUROSYS
2010
ACM
14 years 5 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
POPL
2012
ACM
12 years 4 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of conï¬dentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
NDSS
2007
IEEE
14 years 2 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, ï¬rewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 2 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance†as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
STORAGESS
2005
ACM
14 years 1 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...