Sciweavers

154 search results - page 27 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
ICSM
2009
IEEE
15 years 4 months ago
Experimental assessment of manual versus tool-based maintenance of GUI-directed test scripts
Since manual black-box testing of GUI-based APplications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts in...
Mark Grechanik, Qing Xie, Chen Fu
CODES
2008
IEEE
15 years 4 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 3 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
CGO
2004
IEEE
15 years 1 months ago
Physical Experimentation with Prefetching Helper Threads on Intel's Hyper-Threaded Processors
Pre-execution techniques have received much attention as an effective way of prefetching cache blocks to tolerate the everincreasing memory latency. A number of pre-execution tech...
Dongkeun Kim, Shih-Wei Liao, Perry H. Wang, Juan d...