Sciweavers

40 search results - page 2 / 8
» Introducing Control Flow into Vectorized Code
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 9 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
13 years 3 months ago
Dipole-like fields for stabilization of systems with Pfaffian constraints
This paper introduces a framework that guides the design of stabilizing feedback control laws for systems with Pfaffian constraints. A new class of N-dimensional vector fields, the...
Dimitra Panagou, Herbert G. Tanner, Kostas J. Kyri...
CASES
2004
ACM
13 years 11 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
13 years 3 months ago
Network coding-aware rate control and scheduling in wireless networks
Network coding has been recently applied to wireless networks to increase throughput. It is typically implemented as a thin layer between MAC and IP, transparently to higher layer...
Hulya Seferoglu, Athina Markopoulou, Ulas C. Kozat
CC
2010
Springer
118views System Software» more  CC 2010»
13 years 3 months ago
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values
Abstract. We introduce the concept of future values. Using future values it is possible to represent programs in a new control-flow form such that on any control flow path the data...
Shuhan Ding, Soner Önder