Sciweavers

1081 search results - page 114 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
INTERNET
2006
119views more  INTERNET 2006»
13 years 8 months ago
Toward a Grid-Based DBMS
level is a grid abstract machine, which consists of a collection of typed nodes -- data nodes (purple), director nodes (red), management nodes (orange), and various processing node...
Craig W. Thompson
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 4 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
SRDS
2003
IEEE
14 years 2 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
AGENTS
1997
Springer
14 years 1 months ago
Integrated Premission Planning and Execution for Unmanned Ground Vehicles
Fielding robots in complex applications can stress the human operators responsible for supervising them, particularly because the operators might understand the applications but n...
Edmund H. Durfee, Patrick G. Kenny, Karl C. Kluge
ISPASS
2005
IEEE
14 years 2 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf