Sciweavers

2674 search results - page 29 / 535
» On architecture transparency in operating systems
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
69
Voted
CVPR
2000
IEEE
15 years 11 months ago
Layer Extraction from Multiple Images Containing Reflections and Transparency
Many natural images contain reflections and transparency, i.e., they contain mixtures of reflected and transmitted light. When viewed from a moving camera, these appear as the sup...
Richard Szeliski, Shai Avidan, P. Anandan
SRDS
2003
IEEE
15 years 2 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
MTA
2007
70views more  MTA 2007»
14 years 9 months ago
Tools for transparent synchronous collaborative environments
Synchronous collaborative environments can provide an identical visual and operable working area among geographically separated participants. There are two basic approaches for pro...
Abdulmotaleb El-Saddik, Dongsheng Yang, Nicolas D....
NSPW
2003
ACM
15 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...