Sciweavers

1369 search results - page 116 / 274
» A Practical Implementation of the Timing Attack
Sort
View
USS
2010
14 years 9 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
ANTS
2004
Springer
149views Algorithms» more  ANTS 2004»
15 years 4 months ago
A Binary Recursive Gcd Algorithm
The binary algorithm is a variant of the Euclidean algorithm that performs well in practice. We present a quasi-linear time recursive algorithm that computes the greatest common di...
Damien Stehlé, Paul Zimmermann
COLING
1990
15 years 9 days ago
Efficient Disjunctive Unification for Bottom-Up Parsing
This paper describes two novel techniques which, when applied together, in practice significantly reduce the time required for unifying disjunctive feature structures. The first i...
David M. Carter
SAC
2006
ACM
15 years 5 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
ERSHOV
2006
Springer
15 years 1 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld