This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā...
Causal request traces are valuable to developers of large concurrent and distributed applications, yet diļ¬cult to obtain. Traces show how a request is processed, and can be anal...
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only approved code can execute in kernel mode ove...
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Program query languages and pattern-detection techniques are an essential part of program analysis and manipulation systems. Queries and patterns permit the identiļ¬cation of the...
Coen De Roover, Theo D'Hondt, Johan Brichau, Carlo...