Sciweavers

96 search results - page 5 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
83
Voted
PLDI
1998
ACM
15 years 2 months ago
Run-time Code Generation and Modal-ML
This paper presents a typed programming language and compiler for run-time code generation. The language, called ML2, extends ML with modal operators in the style of the Mini-ML2 ...
Philip Wickline, Peter Lee, Frank Pfenning
75
Voted
ACSAC
2007
IEEE
15 years 4 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
95
Voted
CCS
2008
ACM
15 years 6 days ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
98
Voted
SC
2003
ACM
15 years 3 months ago
Compiler Support for Exploiting Coarse-Grained Pipelined Parallelism
The emergence of grid and a new class of data-driven applications is making a new form of parallelism desirable, which we refer to as coarse-grained pipelined parallelism. This pa...
Wei Du, Renato Ferreira, Gagan Agrawal
100
Voted
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 4 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...