Sciweavers

318 search results - page 23 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 15 days ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
EUROSYS
2008
ACM
14 years 5 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
AMTA
2004
Springer
14 years 2 months ago
Weather Report Translation Using a Translation Memory
We describe the use of a translation memory in the context of a reconstruction of a landmark application of machine translation, the Canadian English to French weather report trans...
Thomas Leplus, Philippe Langlais, Guy Lapalme
PR
2007
104views more  PR 2007»
13 years 8 months ago
Optimizing resources in model selection for support vector machine
Tuning SVM hyperparameters is an important step in achieving a high-performance learning machine. It is usually done by minimizing an estimate of generalization error based on the...
Mathias M. Adankon, Mohamed Cheriet