Sciweavers

52 search results - page 3 / 11
» Tralfamadore: unifying source code and execution experience
Sort
View
CCS
2007
ACM
14 years 17 days ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...
MICRO
1999
IEEE
143views Hardware» more  MICRO 1999»
14 years 26 days ago
Code Transformations to Improve Memory Parallelism
Current microprocessors incorporate techniques to exploit instruction-level parallelism (ILP). However, previous work has shown that these ILP techniques are less effective in rem...
Vijay S. Pai, Sarita V. Adve
ICDE
2000
IEEE
99views Database» more  ICDE 2000»
14 years 10 months ago
XWRAP: An XML-Enabled Wrapper Construction System for Web Information Sources
This paper describes the methodology and the software development of XWRAP, an XML-enabled wrapper construction system for semi-automatic generation of wrapper programs. By XML-ena...
Ling Liu, Calton Pu, Wei Han
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
ACSAC
2008
IEEE
14 years 3 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh