Sciweavers

441 search results - page 74 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 6 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
DIMVA
2009
15 years 24 days ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
DSN
2009
IEEE
15 years 3 months ago
Processor reliability enhancement through compiler-directed register file peak temperature reduction
Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliab...
Chengmo Yang, Alex Orailoglu
DSN
2004
IEEE
15 years 3 months ago
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
Ann T. Tai, Kam S. Tso, William H. Sanders
USENIX
2003
15 years 1 months ago
A Cooperative Internet Backup Scheme
We present a novel peer-to-peer backup technique that allows computers connected to the Internet to back up their data cooperatively: Each computer has a set of partner computers,...
Mark Lillibridge, Sameh Elnikety, Andrew Birrell, ...