Sciweavers

49 search results - page 8 / 10
» Sandboxing Applications
Sort
View
85
Voted
AR
2010
137views more  AR 2010»
14 years 9 months ago
Development of a Visual Odometry System for a Wheeled Robot on Loose Soil using a Telecentric Camera
In this paper, the development of a three-dimensional (3-D) odometry system for wheeled robots on loose soil in an application of planetary exploration is described. When a wheele...
Keiji Nagatani, Ayako Ikeda, Genya Ishigami, Kazuy...
92
Voted
ESE
2008
112views Database» more  ESE 2008»
14 years 9 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
JOC
2010
92views more  JOC 2010»
14 years 4 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
MOBISYS
2010
ACM
14 years 12 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
CCS
2010
ACM
14 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...