|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 16 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
99 | Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger |
Strengthening Software Self-Checksumming via Self-Modifying Code. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
99 | Karl Kleinpaste, Peter Steenkiste, Brian Zill |
Software Support for Outboard Buffering and Checksumming. |
SIGCOMM |
1995 |
DBLP DOI BibTeX RDF |
|
77 | Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
A Generic Attack on Checksumming-Based Software Tamper Resistance. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller |
Virtual machine-provided context sensitive page mappings. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
context sensitive memory, self checksumming code, virtual machine monitor, xen |
33 | Mohsen Ahmadvand, Daniel Below, Sebastian Banescu, Alexander Pretschner |
VirtSC: Combining Virtualization Obfuscation with Self-Checksumming. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
33 | Mohsen Ahmadvand, Daniel Below, Sebastian Banescu, Alexander Pretschner |
VirtSC: Combining Virtualization Obfuscation with Self-Checksumming. |
SPRO@CCS |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Jing Qiu 0003, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su |
Identifying and Understanding Self-Checksumming Defenses in Software. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Humayun Arafat, Sriram Krishnamoorthy, P. Sadayappan |
Checksumming Strategies for Data in Volatile Memories. |
ICPP Workshops |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Gregory G. Finn, Steve Hotz, Rodney Van Meter |
The impact of a zero-scan Internet checksumming mechanism. |
Comput. Commun. Rev. |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Y. Radai |
Checksumming Techniques for Anti-Viral Purposes. |
IFIP Congress (2) |
1992 |
DBLP BibTeX RDF |
|
33 | Helmut Bähring |
Zur Fehlerüberdeckung von Prüfsummen verfahren / The Error Detecting Ability of Checksumming. |
it Inf. Technol. |
1988 |
DBLP DOI BibTeX RDF |
|
33 | John M. McQuillan |
Software checksumming in the IMP and network reliability. |
RFC |
1973 |
DBLP DOI BibTeX RDF |
|
29 | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
SCUBA: Secure Code Update By Attestation in sensor networks. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
externally-verifiable code execution, secure code update, self-checksumming code, software-based attestation |
29 | Roshan G. Ragel, Sri Parameswaran |
IMPRES: integrated monitoring for processor reliability and security. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
basic block checksumming, bit flips detection, check sum encryption, detecting code injection attacks |
29 | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster |
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design |
22 | Andrea Weise, Michael Wan, Wayne Schroeder, Adil Hasan |
Managing Groups of Files in a Rule Oriented Data Management System (iRODS). |
ICCS (3) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
22 | Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal 0001, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
IRON file systems. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
IRON file systems, block corruption, fail-partial failure model, latent sector errors, fault tolerance, reliability, redundancy, storage, internal, disks |
22 | Rob T. Aulwes, David J. Daniel, Nehal N. Desai, Richard L. Graham, L. Dean Risinger, Mark A. Taylor, Timothy S. Woodall, Mitchel W. Sukalski |
Architecture of LA-MPI, A Network-Fault-Tolerant MPI. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Hoi Chang, Mikhail J. Atallah |
Protecting Software Code by Guards. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Amoolya Singh, Almudena Konrad, Anthony D. Joseph |
Performance evaluation of UDP lite for cellular video. |
NOSSDAV |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Jonathan M. Smith |
Practical Problems with a Cryptographic Protection Scheme. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
22 | Sanjiv Ahuja |
On communication software testing (abstract only). |
ACM Conference on Computer Science |
1987 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|