Sciweavers

78 search results - page 5 / 16
» Defensive Execution of Transactional Processes against Attac...
Sort
View
EUROSYS
2007
ACM
15 years 6 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...
INFOCOM
2009
IEEE
15 years 4 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
ACSAC
2007
IEEE
15 years 4 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
88
Voted
SIGMOD
2011
ACM
218views Database» more  SIGMOD 2011»
14 years 13 days ago
A data-oriented transaction execution engine and supporting tools
Conventional OLTP systems assign each transaction to a worker thread and that thread accesses data, depending on what the transaction dictates. This thread-to-transaction work ass...
Ippokratis Pandis, Pinar Tözün, Miguel B...
55
Voted
ACSAC
2005
IEEE
15 years 3 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis