Sciweavers

2178 search results - page 311 / 436
» Toward Systemically Secure IT Architectures
Sort
View
115
Voted
CCS
2010
ACM
15 years 3 months ago
Return-oriented programming without returns
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of c...
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienk...
113
Voted
BILDMED
2007
109views Algorithms» more  BILDMED 2007»
15 years 5 months ago
A Fast and Flexible Image Registration Toolbox
Abstract. In the last decades there has been tremendous research towards the design of fully automatic non-rigid registration schemes. However, apart from the ITK based implementat...
Nils Papenberg, Hanno Schumacher, Stefan Heldmann,...
146
Voted
DSN
2009
IEEE
15 years 10 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
155
Voted
AGENTS
1997
Springer
15 years 7 months ago
Agent-Based Expert Assistance for Visual Problem Solving
This paper presents a domain-independent architecture for facilitating visual problem solving between robots or softbots and humans. The architecture de nes virtual and human agen...
Erika Rogers, Robin R. Murphy, Barb Ericson
124
Voted
DBSEC
2007
104views Database» more  DBSEC 2007»
15 years 5 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng