Sciweavers

3376 search results - page 177 / 676
» Analyzing Software Evolvability
Sort
View
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
15 years 5 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 11 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
USS
2008
15 years 7 months ago
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
Remote error analysis aims at timely detection and remedy of software vulnerabilities through analyzing runtime errors that occur on the client. This objective can only be achieve...
Rui Wang 0010, XiaoFeng Wang, Zhuowei Li
BMCBI
2007
137views more  BMCBI 2007»
15 years 5 months ago
GEVALT: An integrated software tool for genotype analysis
Background: Genotype information generated by individual and international efforts carries the promise of revolutionizing disease studies and the association of phenotypes with al...
Ofir Davidovich, Gad Kimmel, Ron Shamir
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 5 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik