Back to Results
First PageMeta Content
Software bugs / Malware / PaX / Buffer overflow / Return-to-libc attack / Vulnerability / Address space layout randomization / Computer virus / Subroutine / Computing / Computer programming / Software engineering


Program Differentiation-INTERACT-2010-v6-publish
Add to Reading List

Document Date: 2010-02-17 09:21:07


Open Document

File Size: 149,62 KB

Share Result on Facebook

City

Austin / Pittsburgh / /

Company

J. Foster / Intrusion Detection Systems / Apple / The New York Times / Google / Diverse Computer Systems / Microsoft / /

Country

United States / /

Currency

USD / /

/

Facility

University of Michigan / Building Diverse Computer Systems / Rice University / /

IndustryTerm

systems software modifications / undiscovered software vulnerabilities / software modifications / dedicated-application devices / least intrusive solution / Natural immune systems / higher-level software exploits / Internet Information Servers / given software application / software development / energy savings / energy / purpose computing systems / tractable attack solution / software protection mechanism / software executables using hardware support / typical applications / user applications / compromised operating systems / malicious web site / exploitable software vulnerability / rootkit applications / energy efficiency / software program / user-level software / vulnerable systems / Internet Explorer web browser / detection systems / software integrity / phone applications / thirdparty applications / subtle software errors / vulnerable applications / software engineers / web browsers / biological systems / processor-level security systems / applications / software versions / restrictive embedded systems / post-processing application / local search results / immune defense systems / malicious software / software techniques / application processing performance / energy reduction / worst-case software simulations / software systems / software vulnerability / software simulation / programmable device / software applications / software executable versions / search engines / severe software / software programs / electronics / software vulnerabilities / configurable processor / Internet Explorer / /

MarketIndex

RAT / /

OperatingSystem

Windows Vista / Symbian OS / OpenBSD / Microsoft Vista / Gentoo Linux / Mac OS X / Symbian / Linux / Windows 2000 / Windows NT / /

Organization

University of Michigan / Rice University / IDG News Service / Computer Security Lab / U.S Cert Coordination Center / Florida State University / Department of Electrical Engineering / National Science Foundation / IEEE Computer Society / /

Person

Gary Tyson / RAT / Stephen Hines / David Whalley / Paul West / Embedded Benchmark / Daniel Chang / /

Position

source level interpreter / Representative / Hilton Head / Independent Security Advisors / scheduler / /

Product

iPhone / Linux / Apple iPhone / /

ProgrammingLanguage

SQL / XML / php / C / /

ProvinceOrState

Michigan / /

PublishedMedium

The Complete Guide / InfoWorld / IEEE Transactions on Computers / /

Technology

XML / Linux / operating system / html / mobile devices / encryption / cell phones / Alpha / smart phone / smart phones / Operating Systems / cellular telephone / configurable processor / Simulation / /

URL

http /

SocialTag