Sciweavers

2068 search results - page 311 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
PLDI
2006
ACM
15 years 10 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SIGSOFT
2006
ACM
15 years 10 months ago
Detecting increases in feature coupling using regression tests
Repeated changes to a software system can introduce small weaknesses such as unplanned dependencies between different parts of the system. While such problems usually go undetecte...
Olivier Giroux, Martin P. Robillard
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
15 years 10 months ago
galsC: A Language for Event-Driven Embedded Systems
— We introduce galsC, a language designed for programming event-driven embedded systems such as sensor networks. galsC implements the TinyGALS programming model. At the local lev...
Elaine Cheong, Jie Liu
DSN
2005
IEEE
15 years 10 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...