Sciweavers

2081 search results - page 148 / 417
» codes 2006
Sort
View
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 5 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
ICPADS
2006
IEEE
15 years 5 months ago
iDIBS: An Improved Distributed Backup System
iDIBS is a peer-to-peer backup system which optimizes the Distributed Internet Backup System (DIBS). iDIBS offers increased reliability by enhancing the robustness of existing pac...
Faruck Morcos, Thidapat Chantem, Philip Little, Ti...
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 1 months ago
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a...
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat,...
OSDI
2006
ACM
16 years 1 hour ago
A Modular Network Layer for Sensornets
An overall sensornet architecture would help tame the increasingly complex structure of wireless sensornet software and help foster greater interoperability between different code...
Cheng Tien Ee, Rodrigo Fonseca, Sukun Kim, Daekyeo...
FM
2006
Springer
134views Formal Methods» more  FM 2006»
15 years 3 months ago
Formal Verification of a C Compiler Front-End
This paper presents the formal verification of a compiler front-end that translates a subset of the C language into the Cminor intermediate language. The semantics of the source an...
Sandrine Blazy, Zaynah Dargaye, Xavier Leroy