Sciweavers

89 search results - page 3 / 18
» Implementing Services by Partial State Machines
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
13 years 11 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
ICDCS
2007
IEEE
14 years 2 days ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
PTS
2007
97views Hardware» more  PTS 2007»
13 years 7 months ago
Learning and Integration of Parameterized Components Through Testing
Abstract. We investigate the use of parameterized state machine models to drive integration testing, in the case where the models of components are not available beforehand. Theref...
Muzammil Shahbaz, Keqin Li 0002, Roland Groz
SICHERHEIT
2010
13 years 3 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
SUTC
2006
IEEE
13 years 11 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...