Sciweavers

2500 search results - page 362 / 500
» Specifying Behavior in C
Sort
View
116
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
141
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A 3GPP system architecture evolution virtualized experimentation infrastructure for mobility prototyping
The 3GPP System Architecture Evolution (SAE) is a very attractive environment from the service provisioning perspective, thanks to the variety of access technologies and mobility ...
Miguel Gómez Rodríguez, Fermí...
ACSAC
2007
IEEE
15 years 10 months ago
Tracking Darkports for Network Defense
We exploit for defensive purposes the concept of darkports – the unused ports on active systems. We are particularly interested in such ports which transition to become active (...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
109
Voted
ASAP
2007
IEEE
135views Hardware» more  ASAP 2007»
15 years 10 months ago
An Application Specific Memory Characterization Technique for Co-processor Accelerators
Commodity accelerator technologies including reconfigurable devices provide an order of magnitude performance improvement compared to mainstream microprocessor systems. A number o...
Sadaf R. Alam, Jeffrey S. Vetter, Melissa C. Smith
142
Voted
DATE
2007
IEEE
148views Hardware» more  DATE 2007»
15 years 10 months ago
Temperature aware task scheduling in MPSoCs
In deep submicron circuits, elevation in temperatures has brought new challenges in reliability, timing, performance, cooling costs and leakage power. Conventional thermal managem...
Ayse Kivilcim Coskun, Tajana Simunic Rosing, Keith...