Sciweavers

HPCA
2011
IEEE
12 years 8 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
ACSAC
2000
IEEE
13 years 9 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
SRDS
2003
IEEE
13 years 10 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
CODES
2005
IEEE
13 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
13 years 11 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
13 years 11 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
PERCOM
2005
ACM
14 years 4 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
CHI
2008
ACM
14 years 5 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi