Sciweavers

9503 search results - page 20 / 1901
» Authenticated System Calls
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
DSD
2008
IEEE
127views Hardware» more  DSD 2008»
15 years 6 months ago
Measurement, Analysis and Modeling of RTOS System Calls Timing
This paper presents a methodology for accurately characterizing the system calls of an operating system for embedded applications. Characterization consists of two phases: measure...
Carlo Brandolese, William Fornaciari
ACSAC
2008
IEEE
15 years 6 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
VTC
2007
IEEE
15 years 6 months ago
An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
–Call admission control (CAC) is essential to guarantee the signal quality in CDMA systems. Signal-tointerference-and-noise ratio (SINR) is used as a criterion for user admission...
Mahmoud El-Sayes, Mohamed H. Ahmed
ICARIS
2005
Springer
15 years 5 months ago
Polymorphism and Danger Susceptibility of System Call DASTONs
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
Anjum Iqbal, Mohd Aizaini Maarof