Sciweavers

183 search results - page 9 / 37
» Software Protection Through Dynamic Code Mutation
Sort
View
GCA
2007
15 years 1 months ago
Transparent File Protection in On-Demand Computing
On-Demand Computing fulfills the need of computing availability at limited hardware and software costs. Distributed systems of this kind typically store user files in a shared ...
Fabio Dellutri, Salvatore Di Blasi, Giuseppe F. It...
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
15 years 6 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
80
Voted
ASPLOS
2004
ACM
15 years 5 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
VEE
2012
ACM
187views Virtualization» more  VEE 2012»
13 years 7 months ago
DDGacc: boosting dynamic DDG-based binary optimizations through specialized hardware support
Dynamic Binary Translators (DBT) and Dynamic Binary Optimization (DBO) by software are used widely for several reasons including performance, design simplification and virtualiza...
Demos Pavlou, Enric Gibert, Fernando Latorre, Anto...
IAT
2006
IEEE
15 years 5 months ago
Dynamical Control in Large-Scale Material Handling Systems through Agent Technology
Delayed arrivals, missing tag codes, flight changes, break-downs, etc. are some of the factors, which make the environment of airport baggage handling systems (BHS) extremely dyn...
Kasper Hallenborg, Yves Demazeau