Sciweavers

CCS
2008
ACM
13 years 6 months ago
Robust content-driven reputation
In content-driven reputation systems for collaborative content, users gain or lose reputation according to how their contributions fare: authors of long-lived contributions gain r...
Krishnendu Chatterjee, Luca de Alfaro, Ian Pye
CCS
2008
ACM
13 years 6 months ago
Automatic feature selection for anomaly detection
Marius Kloft, Ulf Brefeld, Patrick Düssel, Ch...
CCS
2008
ACM
13 years 6 months ago
Boxing clever with IOMMUs
Grzegorz Milos, Derek Gordon Murray
CCS
2008
ACM
13 years 6 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
CCS
2008
ACM
13 years 6 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
CCS
2008
ACM
13 years 6 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé
CCS
2008
ACM
13 years 6 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
CCS
2008
ACM
13 years 6 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CCS
2008
ACM
13 years 6 months ago
Remote attestation on program execution
Liang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie...
CCS
2008
ACM
13 years 6 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar