Sciweavers

7225 search results - page 217 / 1445
» Software is data too
Sort
View
123
Voted
ACSAC
2006
IEEE
15 years 10 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
ACSAC
2005
IEEE
15 years 10 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
120
Voted
DATE
2004
IEEE
138views Hardware» more  DATE 2004»
15 years 8 months ago
STEPS: Experimenting a New Software-Based Strategy for Testing SoCs Containing P1500-Compliant IP Cores
This paper presents STEPS, an innovative softwarebased approach for testing P1500-compliant SoCs. STEPS is based on the concept that the ATE is not considered as an initiator appl...
Mounir Benabdenbi, Alain Greiner, François ...
SIGCOMM
1995
ACM
15 years 8 months ago
Software Support for Outboard Buffering and Checksumming
Data copying and checksumming are the most expensive operations when doing high-bandwidth network IO over a highspeed network. Under some conditions, outboard buffering and checks...
Karl Kleinpaste, Peter Steenkiste, Brian Zill
ESI
2010
93views more  ESI 2010»
15 years 3 months ago
VxOware: software for managing virtual observatory metadata
The recent Heliophysics Virtual Observatory (VxO) effort involves the development of separate observatories with a low overlap in physical domain or area of scientific specializat...
Robert S. Weigel, Mikhail N. Zhizhin, Dmitry Mishi...