Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Portable mobile robots, in the size class of 20 kg or less, could be extremely valuable as autonomous reconnaissance platforms in urban hostage situations and disaster relief. We ...
Larry Matthies, Yalin Xiong, Robert W. Hogg, David...
A shared distributed infrastructure is formed by federating computation resources from multiple domains. Such shared infrastructures are increasing in popularity and are providing...
Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell...
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Abstract— Creating exercises for learners requires significant time. This is one reason, beside difficulties of discussing individualized tasks in a classroom setting, why often ...