Sciweavers

49 search results - page 1 / 10
» Low-Level Software Security: Attacks and Defenses
Sort
View
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
13 years 11 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 5 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
IJISEC
2006
106views more  IJISEC 2006»
13 years 5 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
WSC
2008
13 years 8 months ago
Dynamic security: An agent-based model for airport defense
The Department of Homeland Security (DHS) shifted the focus of airport security in 2004 to incorporate the need to continuously and rapidly adapt security to shifting threats. MIT...
William E. Weiss