It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the applicationās beh...
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā...
Web-based collaboration systems typically require dynamic and context-based interactions between people and services. To support such complex interaction scenarios, we introduce a...
High-speed packet content inspection and ļ¬ltering devices rely on a fast multi-pattern matching algorithm which is used to detect predeļ¬ned keywords or signatures in the packe...
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need eļ¬cient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...