Sciweavers

45 search results - page 3 / 9
» Transparent Runtime Randomization for Security
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
ACSAC
2005
IEEE
14 years 1 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Lightweight JPEG2000 Encryption with Anisotropic Wavelet Packets
A lightweight encryption technique for JPEG2000 with optional support for transparent encryption is proposed. Randomized anisotropic wavelet packet bases are used to construct a s...
Dominik Engel, Andreas Uhl
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...