Sciweavers

345 search results - page 12 / 69
» Effective memory protection using dynamic tainting
Sort
View
SIGCOMM
1997
ACM
15 years 1 months ago
Dynamics of Random Early Detection
In this paper we evaluate the effectiveness of Random Early Detection (RED) over traffic types categorized as nonadaptive, fragile and robust, according to their responses to con...
Dong Lin, Robert Morris
ESE
2007
124views Database» more  ESE 2007»
14 years 9 months ago
A study of effectiveness of dynamic slicing in locating real faults
Dynamic slicing algorithms have been considered to aid in debugging for many years. However, as far as we know, no detailed studies on evaluating the benefits of using dynamic sl...
Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
EUROSYS
2008
ACM
15 years 6 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
BIOID
2008
101views Biometrics» more  BIOID 2008»
14 years 11 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
USS
2004
14 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta