Sciweavers

22 search results - page 1 / 5
» A Run-Time Memory Protection Methodology
Sort
View
ASPDAC
2007
ACM
88views Hardware» more  ASPDAC 2007»
13 years 8 months ago
A Run-Time Memory Protection Methodology
Udaya Seshua, Nagaraju Bussa, Bart Vermeulen
FPGA
1997
ACM
132views FPGA» more  FPGA 1997»
13 years 9 months ago
Wormhole Run-Time Reconfiguration
Configurable Computing Machines (CCMs) are an emerging class of computing platform which provide the computational performance benefits of ASICs, yet retain the flexibility and ra...
Ray Bittner, Peter M. Athanas
IWIA
2005
IEEE
13 years 10 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
ICSE
2010
IEEE-ACM
13 years 9 months ago
A methodology to support load test analysis
Performance analysts rely heavily on load testing to measure the performance of their applications under a given load. During the load test, analyst strictly monitor and record th...
Haroon Malik
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 12 days ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson