Sciweavers

518 search results - page 47 / 104
» Abstract Interpretation-Based Protection
Sort
View
107
Voted
EUROSYS
2009
ACM
15 years 11 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
116
Voted
EUROSYS
2007
ACM
15 years 11 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
ISW
2007
Springer
15 years 8 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
AIME
2009
Springer
15 years 7 months ago
Prediction of Mechanical Lung Parameters Using Gaussian Process Models
Abstract. Mechanical ventilation can cause severe lung damage by inadequate adjustment of the ventilator. We introduce a Machine Learning approach to predict the pressure-dependent...
Steven Ganzert, Stefan Kramer, Knut Möller, D...
ECOOPW
1999
Springer
15 years 6 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad