Sciweavers

84 search results - page 16 / 17
» Architectural Support for Copy and Tamper Resistant Software
Sort
View
CF
2004
ACM
13 years 10 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
GIS
2010
ACM
13 years 3 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 9 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
EMSOFT
2011
Springer
12 years 5 months ago
Aciom: application characteristics-aware disk and network i/o management on android platform
The last several years have seen a rapid increase in smart phone use. Android offers an open-source software platform on smart phones, that includes a Linux-based kernel, Java app...
Hyosu Kim, Minsub Lee, Wookhyun Han, Kilho Lee, In...
SOSP
2003
ACM
14 years 2 months ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy