A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Temporal Meningoencephaloceles: Diagnostic Pitfalls, Surgical Repair, and Associated Pathologies
2012
Journal of Neurological Surgery. Part B: Skull Base: an interdisciplinary approach
The Occipital Transtentorial Approach for Superior Vermian and Superomedial Cerebellar Arteriovenous Malformations: Advantages, Limitations, and Options Nancy McLaughlin (presenter), Neil A. ...
The system is currently deployed in a prospective clinical trial in skull base surgery. ...
Methods: We compared results between two AAs (Sunitinib and VEGF-Trap) in combination with RT in preclinical glioma models. ...
doi:10.1055/s-0032-1312137
fatcat:cfipybpk6jba5cf7o5ji2o75je
On the Dissection of Evasive Malware
2020
IEEE Transactions on Information Forensics and Security
The final version of record is available at http://dx.7 With ten years' experience as principal malware analyst in security firms. 8 Currently the only maintained generic, open VMI debugging interface. ...
Our open-source prototype BluePill (i) offers a customizable execution environment that remains stealthy when analysts intervene to alter instructions and data or run third-party tools, (ii) is extensible ...
Traps and Pitfalls: In dynamic analysis systems it is crucial to intercept interactions between a sample and the OS. ...
doi:10.1109/tifs.2020.2976559
fatcat:v7eaj2fskbfyndi5m4c5c2yqra
SoK
2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19
CCS CONCEPTS • Security and privacy → Systems security; Intrusion/anomaly detection and malware mitigation; Software reverse engineering; Software security engineering. ...
The ease of use and flexibility of DBI primitives has made them popular in a large body of research in different domains, including software security. ...
We are grateful to Ke Sun, Xiaoning Li, and Ya Ou for sharing their code [56] with us. This work is supported in part by a grant of the Italian Presidency of the Council of Ministers. ...
doi:10.1145/3321705.3329819
dblp:conf/ccs/DEliaCNPC19
fatcat:fufu24vp3zfptdpscszkz7h4nm
Understanding TEE Containers, Easy to Use? Hard to Trust
[article]
2021
arXiv
pre-print
We observe that none of the existing TEE containers can fulfill the goal they set, due to various pitfalls in their design and implementation. ...
In this paper, we studied the isolation strategies of 15 existing TEE containers to protect secure applications from potentially malicious operating systems (OS) or untrusted applications, using a semi-automatic ...
To improve the secure development of Tcons, a system call fuzzer and a suite of security benchmarks were proposed and implemented that are applicable to test those Tcons. ...
arXiv:2109.01923v1
fatcat:qgkbhnf6ffb7tmdygv2jsowjty
Virtual Breakpoints for x86/64
[article]
2019
arXiv
pre-print
This design incorporates lessons learned from 50 years of virtualization and debugger design to deliver fast, reliable trapping without the pitfalls of traditional binary modification. ...
In this paper we demonstrate the fundamental abstraction failures of current trapping methods, and design a new mechanism from the hardware up. ...
Introduction In the modern age of malware analysis and "fuzzing for dollars", security researchers are still seeking a robust, transparent, efficient instruction trapping system. ...
arXiv:1801.09250v3
fatcat:pil46hghefheffjuultppzqb6i
ARMlock
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
Our security assessment and performance measurement show that ARMlock is practical, effective, and efficient. ...
For example, they can use self-modifying code, receive exceptions, and make system calls. Moreover, system calls can be interposed by ARMlock to enforce the policies set by the host. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the FSU and NSFC. ...
doi:10.1145/2660267.2660344
dblp:conf/ccs/ZhouWCW14
fatcat:5wdpcjiif5b2fke647hrr3o54a
Designing Robust API Monitoring Solutions
[article]
2021
arXiv
pre-print
Tracing the sequence of library and system calls that a program makes is very helpful in the characterization of its interactions with the surrounding environment and ultimately of its semantics. ...
building API tracers for software security research. ...
The variant ships as a highlevel library suitable either for standalone usage as an inguest API monitoring tool or for being plugged in existing analysis systems based on Pin, which are numerous in security ...
arXiv:2005.00323v2
fatcat:37q5xujff5asdniseusognyfi4
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
[article]
2021
arXiv
pre-print
Overall, we believe sub-process isolation is a must and that the Endokernel exposes an essential set of abstractions for realizing this in a simple and feasible way. ...
Commodity applications contain more and more combinations of interacting components (user, application, library, and system) and exhibit increasingly diverse tradeoffs between isolation, performance, and ...
Microbenchmarks System call overhead We evaluate Intravirt's overhead on system calls and signal delivery in comparison to native and the ptrace-based techniques. ...
arXiv:2108.03705v2
fatcat:tovxud33k5crnlpqmnsrd4mfmu
Extending ACID semantics to the file system
2007
ACM Transactions on Storage
In our prototype ACID file system, called Amino, updated applications can protect arbitrary sequences of system calls within a transaction. ...
To solve these problems, a file system should allow a sequence of operations to be encapsulated in a single atomic transaction. ...
Tzi-cker Chiueh, Alex Mohr, and Margo Seltzer, were generous of their time and provided significant helpful input and comments on the work. Rob Johnson, R. C. ...
doi:10.1145/1242520.1242521
fatcat:kswb7mmuifavxh4cychvykvg3a
Introduction: Transitions, Revolutions, and Reinventions: Discourses on Human Capabilities and World Configurations
2014
Spectra
partial defense of Martha Nussbaum's and Amartya Sen's capability-based approach, which I think is uniquely situated to address the inequalities of the racial contract. ...
Global relations are largely shaped by what Charles Mills calls "the racial contract": the sometimes explicit and sometimes unspoken agreement that social arrangements must favor whites over nonwhites. ...
Maybe not a cause or an intent, but as much of a factor in the security practices, violent practices and reactions of the United States, especially in the 2000s, than a typical sort of national security ...
doi:10.21061/spectra.v3i1.213
fatcat:lim7ny76snhlthql5t3bpt7xqm
ECR 2011 Book of Abstracts - A - Postgraduate Educational Programme
2011
Insights into Imaging
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3. ...
Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation. ...
an efficient problem-solving tool. ...
doi:10.1007/s13244-011-0078-3
pmid:23100070
pmcid:PMC3533621
fatcat:qa3ln4hhvve2hhumgwwnmykgoe
ECR 2016 Book of Abstracts - A - Postgraduate Educational Programme
2016
Insights into Imaging
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3. ...
Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation. ...
an efficient problem-solving tool. ...
doi:10.1007/s13244-016-0474-9
pmid:26873353
pmcid:PMC4762839
fatcat:itxslbcacjhh3kixfkcwmdbt44
ECR 2015 Book of Abstracts - A - Postgraduate Educational Programme
2015
Insights into Imaging
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3. ...
Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation. ...
an efficient problem-solving tool. ...
doi:10.1007/s13244-015-0386-0
pmid:25708993
pmcid:PMC4349897
fatcat:m7eyvqcwojfpvf3lr5hy6dwjb4
ECR 2013 Book of Abstracts - A - Postgraduate Educational Programme
2013
Insights into Imaging
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3. ...
Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation. ...
an efficient problem-solving tool. ...
doi:10.1007/s13244-013-0227-y
pmid:23468009
pmcid:PMC3666656
fatcat:yitsk227mba2pl7wcypouf6tz4
Identity Boxing: A New Technique for Consistent Global Identity
ACM/IEEE SC 2005 Conference (SC'05)
We have implemented identity boxing at the user level within a secure system-call interposition agent and applied it to a distributed storage and execution system. ...
This forces each grid system to provide a mapping from global to local identities, creating a significant administrative burden and inhibiting many possibilities of data sharing. ...
SECURITY AND CORRECTNESS System call trapping is a secure interposition method. If the mechanism is properly implemented, the child process is unable to escape the control of the supervisor. ...
doi:10.1109/sc.2005.34
dblp:conf/sc/Thain05
fatcat:a2qzkknrbfaojgszhugdtskvcq
« Previous
Showing results 1 — 15 out of 268 results