Sciweavers

2269 search results - page 351 / 454
» Behavioral Intrusion Detection
Sort
View
COMPSAC
2009
IEEE
15 years 11 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
ICRA
2009
IEEE
128views Robotics» more  ICRA 2009»
15 years 11 months ago
Tissue property estimation and graphical display for teleoperated robot-assisted surgery
— Palpation of tissue and organs during a surgical procedure provides clinicians with valuable information for diagnosis and surgical planning. In robot-assisted minimally invasi...
Tomonori Yamamoto, Balázs Vágvö...
RAID
2009
Springer
15 years 11 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
DSN
2008
IEEE
15 years 11 months ago
Coverage of a microarchitecture-level fault check regimen in a superscalar processor
Conventional processor fault tolerance based on time/space redundancy is robust but prohibitively expensive for commodity processors. This paper explores an unconventional approac...
Vimal K. Reddy, Eric Rotenberg
RTSS
2008
IEEE
15 years 11 months ago
Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems
COTS peripherals are heavily used in the embedded market, but their unpredictability is a threat for high-criticality real-time systems: it is hard or impossible to formally verif...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Marco...