Sciweavers

41 search results - page 5 / 9
» TrustLogin: Securing Password-Login on Commodity Operating S...
Sort
View
HOTOS
2009
IEEE
14 years 2 months ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
EUROSEC
2009
ACM
14 years 5 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
IPPS
2006
IEEE
14 years 4 months ago
On-the-fly kernel updates for high-performance computing clusters
High-performance computing clusters running longlived tasks currently cannot have kernel software updates applied to them without causing system downtime. These clusters miss oppo...
Kristis Makris, Kyung Dong Ryu
CCS
2005
ACM
14 years 4 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
CCS
2007
ACM
14 years 5 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...