Sciweavers

38 search results - page 5 / 8
» Operating System Interface Obfuscation and the Revealing of ...
Sort
View
DSOM
2003
Springer
15 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
ICAD
2004
14 years 11 months ago
A Generic, Semantically-Based Design Approach for Spatial Auditory Computer Displays
This paper describes a design approach for creating generic computer user interfaces with spatial auditory displays. It proposes a structured depiction process from formulating mo...
Christopher Frauenberger, Robert Höldrich, Al...
84
Voted
ICPP
2005
IEEE
15 years 3 months ago
LiMIC: Support for High-Performance MPI Intra-node Communication on Linux Cluster
High performance intra-node communication support for MPI applications is critical for achieving best performance from clusters of SMP workstations. Present day MPI stacks cannot ...
Hyun-Wook Jin, Sayantan Sur, Lei Chai, Dhabaleswar...
54
Voted
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
DMIN
2006
141views Data Mining» more  DMIN 2006»
14 years 11 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov