Sciweavers

345 search results - page 14 / 69
» Effective memory protection using dynamic tainting
Sort
View
CEC
2007
IEEE
15 years 4 months ago
Static experts and dynamic enemies in coevolutionary games
Abstract— The usage of memory in coevolutionary systems offers a wide range of research possibilities, especially when evolving computationally intelligent computer players for g...
Phillipa M. Avery, Zbigniew Michalewicz
CCS
2008
ACM
14 years 11 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 3 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
15 years 4 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang
CF
2009
ACM
15 years 4 months ago
Strategies for dynamic memory allocation in hybrid architectures
Hybrid architectures combining the strengths of generalpurpose processors with application-specific hardware accelerators can lead to a significant performance improvement. Our ...
Peter Bertels, Wim Heirman, Dirk Stroobandt