Sciweavers

37 search results - page 8 / 8
» Tools and Techniques for Failure Analysis and Qualification ...
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
13 years 11 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
SENSYS
2009
ACM
14 years 2 days ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...