Sciweavers

56 search results - page 2 / 12
» A framework for malicious workload generation
Sort
View
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
13 years 12 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel
ICDE
2010
IEEE
195views Database» more  ICDE 2010»
13 years 5 months ago
Statistics-driven workload modeling for the Cloud
— A recent trend for data-intensive computations is to use pay-as-you-go execution environments that scale transparently to the user. However, providers of such environments must...
Archana Ganapathi, Yanpei Chen, Armando Fox, Randy...
ISPASS
2010
IEEE
14 years 13 days ago
Synthesizing memory-level parallelism aware miniature clones for SPEC CPU2006 and ImplantBench workloads
Abstract—We generate and provide miniature synthetic benchmark clones for modern workloads to solve two pre-silicon design challenges, namely: 1) huge simulation time (weeks to m...
Karthik Ganesan, Jungho Jo, Lizy K. John
KBSE
2009
IEEE
14 years 9 days ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
USENIX
2008
13 years 8 months ago
Cutting Corners: Workbench Automation for Server Benchmarking
A common approach to benchmarking a server is to measure its behavior under load from a workload generator. Often a set of such experiments is required-perhaps with different serv...
Piyush Shivam, Varun Marupadi, Jeffrey S. Chase, T...