Taxonomic Search: franz OR frachetti
Results 1 - 10 of 11
This paper describes a systematic approach for analyzing code reuse attacks and defenses. It was presented at RAID'13 Symposium and published in Lecture Notes in Computer Science (LNCS) Volume 8145.
The 4th Analytic Virtual
Integration of Cyber-Physical Systems Workshop
Vancouver, Canada, December 3, 2013.
(Co-located with RTSS 2013)
2nd International Workshop on Dependability Issues in Cloud Computing
Held in conjunction with the 32nd IEEE International Symposium on Reliable Distributed Systems (SRDS)
Extracting optimal performance from modern computing platforms has become increasingly difficult. The effect is particularly noticeable in computations that are of mathematical nature such as those needed in media processing, communication, control, data analytics, or scientific simulations. In these domains, straightfoward implementations often underperform by one or even two orders of magnitude. The reason is in optimizations that are knnow to be difficult and often impossible for compilers: parallelization, vectorization, and locailty optimizations.
We have been investigating compiler-generated software diversity as a defense mechanism against software attacks. This approach is in many ways similar to biodiversity in nature.
The results of the poster session informal voting competition are as follows:
#1 Cybersecurity Career Engagement - 11 votes
Diane Burley (George Washington/National CyberWatch), Portia Pusey (National CyberWatch), David Tobey (NBISE)
#2 Compositional Security – 10 votes
Anupam Datta (CMU), Limin Jia (CMU), Jeanette Wing (CMU)