Z Kotulski, TW Nowak, M Sepczuk, MA Tunia - Computer Networks, 2020 - Elsevier
In this paper, we present a systematic overview of existing isolation techniques in nodes and networks, especially in the Radio Access Network and the Core Network (RAN and CN) to …
G Balakrishnan, T Reps - International conference on compiler …, 2004 - Springer
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be created …
V Haldar, D Chandra, M Franz - USENIX Virtual Machine Research and …, 2004 - usenix.org
Remote attestation is one of the core functionalities provided by trusted computing platforms. It holds the promise of enabling a variety of novel applications. However, current techniques …
R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different forms of attacks. This article seeks to understand existing security isolation techniques by …
In this paper we generalize the notion of non-interference making it parametric relatively to what an attacker can analyze about the input/output information flow. The idea is to consider …
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by eg malicious injected scripts or poorly designed …
A Lapadula, R Pugliese, F Tiezzi - European Symposium on Programming, 2007 - Springer
We introduce COWS (Calculus for Orchestration of Web Services), a new foundational language for SOC whose design has been influenced by WS-BPEL, the de facto standard …
Our society's widespread dependence on networked information systems for everything from personal finance to military communications makes it essential to improve the security of …
J Bater, G Elliott, C Eggen, S Goel, A Kho… - arXiv preprint arXiv …, 2016 - arxiv.org
People and machines are collecting data at an unprecedented rate. Despite this newfound abundance of data, progress has been slow in sharing it for open science, business, and …