Sciweavers

318 search results - page 42 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
13 years 9 days ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
14 years 2 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
EACL
2006
ACL Anthology
13 years 10 months ago
Automatic Acronym Recognition
This paper deals with the problem of recognizing and extracting acronymdefinition pairs in Swedish medical texts. This project applies a rule-based method to solve the acronym rec...
Dana Dannélls
VCIP
2000
124views Communications» more  VCIP 2000»
13 years 10 months ago
Rendering of 3D-wavelet-compressed concentric mosaic scenery with progressive inverse wavelet synthesis (PIWS)
The concentric mosaics offer a quick solution to the construction and navigation of a virtual environment. To reduce the vast data amount of the concentric mosaics, a compression ...
Yunnan Wu, Lin Luo, Jin Li, Ya-Qin Zhang
ASPLOS
2006
ACM
14 years 12 days ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...