Sciweavers

201 search results - page 40 / 41
» Tools to Support Secure Enterprise Computing
Sort
View
EUROSYS
2010
ACM
16 years 19 days ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
POPL
2012
ACM
13 years 11 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of conï¬dentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
108
Voted
NDSS
2007
IEEE
15 years 9 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, ï¬rewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
137
Voted
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 9 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance†as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
123
Voted
STORAGESS
2005
ACM
15 years 9 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...