115
click to vote
ACSAC
15 years 4 months ago
2007 IEEE
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
114
click to vote
ACSAC
15 years 6 months ago
2007 IEEE
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
101
click to vote
ACSAC
15 years 6 months ago
2007 IEEE
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
ACSAC
15 years 6 months ago
2007 IEEE
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
|