Sciweavers

318 search results - page 41 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
IPPS
1994
IEEE
14 years 23 days ago
Parallel Evaluation of a Parallel Architecture by Means of Calibrated Emulation
A parallel transputer-based emulator has been developed to evaluate the DDM--ahighlyparallel virtual shared memory architecture. The emulator provides performance results of a har...
Henk L. Muller, Paul W. A. Stallard, David H. D. W...
ENTCS
2006
104views more  ENTCS 2006»
13 years 8 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas
ENTCS
2002
88views more  ENTCS 2002»
13 years 8 months ago
Testing Concurrent Java Programs using Randomized Scheduling
The difficulty of finding errors caused by unexpected interleavings of threads in concurrent programs is well known. Model checkers can pinpoint such errors and verify correctness...
Scott D. Stoller
ESORICS
2007
Springer
14 years 2 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...