Sciweavers

318 search results - page 29 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SENSYS
2006
ACM
14 years 2 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
SPIN
2004
Springer
14 years 2 months ago
Directed Error Detection in C++ with the Assembly-Level Model Checker StEAM
Most approaches for model checking software are based on ration of abstract models from source code, which may greatly reduce the search space, but may also introduce errors that a...
Peter Leven, Tilman Mehler, Stefan Edelkamp
IPPS
2010
IEEE
13 years 5 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
RAID
2010
Springer
13 years 7 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
14 years 15 days ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...