Sciweavers

1816 search results - page 223 / 364
» Trace oblivious computation
Sort
View
CCS
2009
ACM
14 years 28 days ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
CONEXT
2007
ACM
14 years 26 days ago
A hybrid finite automaton for practical deep packet inspection
Deterministic finite automata (DFAs) are widely used to perform regular expression matching in linear time. Several techniques have been proposed to compress DFAs in order to redu...
Michela Becchi, Patrick Crowley
CLUSTER
2009
IEEE
14 years 26 days ago
A performance evaluation of scientific I/O workloads on Flash-based SSDs
Abstract-- Flash-based solid state disks (SSDs) are an alternative form of storage device that promises to deliver higher performance than the traditional mechanically rotating har...
Stan Park, Kai Shen
PERCOM
2010
ACM
14 years 25 days ago
Dead reckoning from the pocket - An experimental study
—Modern mobile phones enable absolute positioning based on GPS or WiFi. However, incremental positioning based on dead reckoning is an interesting source of complementary informa...
Ulrich Steinhoff, Bernt Schiele
ANCS
2006
ACM
14 years 20 days ago
Packet pre-filtering for network intrusion detection
As Intrusion Detection Systems (IDS) utilize more complex syntax to efficiently describe complex attacks, their processing requirements increase rapidly. Hardware and, even more, ...
Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N....