Sciweavers

1369 search results - page 55 / 274
» A Practical Implementation of the Timing Attack
Sort
View
65
Voted
CEAS
2004
Springer
15 years 4 months ago
On Attacking Statistical Spam Filters
The efforts of anti-spammers and spammers has often been described as an arms race. As we devise new ways to stem the flood of bulk mail, spammers respond by working their way ar...
Gregory L. Wittel, Shyhtsun Felix Wu
ICCCN
2008
IEEE
15 years 5 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...
93
Voted
DSN
2007
IEEE
15 years 5 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
78
Voted
KBSE
1997
IEEE
15 years 3 months ago
NORA/HAMMR: Making Deduction-Based Software Component Retrieval Practical
Deduction-based software component retrieval uses preand postconditions as indexes and search keys and an automated theorem prover (ATP) to check whether a component matches. This...
Johann Schumann, Bernd Fischer 0002
94
Voted
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 4 months ago
Practical voltage scaling for mobile multimedia devices
This paper presents the design, implementation, and evaluation of a practical voltage scaling (PDVS) algorithm for mobile devices primarily running multimedia applications. PDVS s...
Wanghong Yuan, Klara Nahrstedt