咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程

主题

  • 3 篇 memory exploitat...
  • 2 篇 source code tran...
  • 2 篇 k-variant archit...
  • 1 篇 system design wi...
  • 1 篇 reliability
  • 1 篇 task analysis
  • 1 篇 defense strategi...
  • 1 篇 system security
  • 1 篇 buffer overflows
  • 1 篇 attack survivabi...
  • 1 篇 analytical model...
  • 1 篇 security
  • 1 篇 multiple variant...
  • 1 篇 n-version archit...
  • 1 篇 k-variant system...
  • 1 篇 memory architect...

机构

  • 1 篇 iit dept comp sc...
  • 1 篇 iit il 60616 usa
  • 1 篇 iit dept comp sc...

作者

  • 3 篇 bekiroglu berk
  • 3 篇 korel bogdan

语言

  • 3 篇 英文
检索条件"主题词=Memory exploitation attacks"
3 条 记 录,以下是1-10 订阅
排序:
Survivability Analysis of K-Variant Architecture for Different memory attacks and Defense Strategies
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021年 第4期18卷 1868-1881页
作者: Bekiroglu, Berk Korel, Bogdan IIT Dept Comp Sci Chicago IL 60616 USA
Many systems require high security during a limited operational timeframe. These systems can be exposed to many attacks that prevent tasks from being completed. To reduce the chances of a successful attack and increas... 详细信息
来源: 评论
Neural Network-based Tool for Survivability Assessment of K-variant Systems
收藏 引用
INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS 2023年 第4期32卷 2350049-2350049页
作者: Bekiroglu, Berk Korel, Bogdan IIT Dept Comp Sci 10 West 31st St Chicago IL 60616 USA
The K-variant is a multi-variant architecture to enhance the security of the time-bounded mission and safety-critical systems. Variants in the K-variant architecture are generated by controlled source program transfor... 详细信息
来源: 评论
Source Code Transformations for Improving Security of Time-bounded K-variant Systems
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2021年 137卷 106601-106601页
作者: Bekiroglu, Berk Korel, Bogdan IIT Chicago IL 60616 USA
Context: Source code transformation techniques can improve the security of systems against memory exploitation attacks. As such, the chance of exploitation of security vulnerabilities can be decreased by using differe... 详细信息
来源: 评论