Sciweavers

1477 search results - page 60 / 296
» Token flow control
Sort
View
89
Voted
ACSAC
2008
IEEE
15 years 7 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
94
Voted
CC
2007
Springer
15 years 7 months ago
Correcting the Dynamic Call Graph Using Control-Flow Constraints
Abstract. To reason about programs, dynamic optimizers and analysis tools use sampling to collect a dynamic call graph (DCG). However, sampling has not achieved high accuracy with ...
Byeongcheol Lee, Kevin Resnick, Michael D. Bond, K...
133
Voted
DRM
2005
Springer
15 years 6 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
102
Voted
INFOCOM
2003
IEEE
15 years 6 months ago
Stability and Convergence of TCP-like Congestion Controllers in a Many-Flows Regime
— With the rapid growth of Internet, parameter design and analysis for large-scale networks has become a topic of active interest. Since simulation of such large scale systems is...
Supratim Deb, Sanjay Shakkottai, R. Srikant
156
Voted
ECUMN
2004
Springer
15 years 4 months ago
A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision
In a competitive telecommunications marketplace, operators must provide customers with rapid access to both new and traditional service offerings. Market share is developed through...
Daniel Won-Kyu Hong, Choong Seon Hong