Filters








268 Hits in 25.0 sec

Temporal Meningoencephaloceles: Diagnostic Pitfalls, Surgical Repair, and Associated Pathologies

Hwa Son, Alexandre Karkas, Ravi Samy, Philip Theodosopoulos, Myles Pensak
2012 Journal of Neurological Surgery. Part B: Skull Base: an interdisciplinary approach  
The Occipital Transtentorial Approach for Superior Vermian and Superomedial Cerebellar Arteriovenous Malformations: Advantages, Limitations, and Options Nancy McLaughlin (presenter), Neil A.  ...  The system is currently deployed in a prospective clinical trial in skull base surgery.  ...  Methods: We compared results between two AAs (Sunitinib and VEGF-Trap) in combination with RT in preclinical glioma models.  ... 
doi:10.1055/s-0032-1312137 fatcat:cfipybpk6jba5cf7o5ji2o75je

On the Dissection of Evasive Malware

Daniele Cono DElia, Emilio Coppa, Federico Palmaro, Lorenzo Cavallaro
2020 IEEE Transactions on Information Forensics and Security  
The final version of record is available at http://dx.7 With ten years' experience as principal malware analyst in security firms. 8 Currently the only maintained generic, open VMI debugging interface.  ...  Our open-source prototype BluePill (i) offers a customizable execution environment that remains stealthy when analysts intervene to alter instructions and data or run third-party tools, (ii) is extensible  ...  Traps and Pitfalls: In dynamic analysis systems it is crucial to intercept interactions between a sample and the OS.  ... 
doi:10.1109/tifs.2020.2976559 fatcat:v7eaj2fskbfyndi5m4c5c2yqra

SoK

Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro
2019 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19  
CCS CONCEPTS • Security and privacy → Systems security; Intrusion/anomaly detection and malware mitigation; Software reverse engineering; Software security engineering.  ...  The ease of use and flexibility of DBI primitives has made them popular in a large body of research in different domains, including software security.  ...  We are grateful to Ke Sun, Xiaoning Li, and Ya Ou for sharing their code [56] with us. This work is supported in part by a grant of the Italian Presidency of the Council of Ministers.  ... 
doi:10.1145/3321705.3329819 dblp:conf/ccs/DEliaCNPC19 fatcat:fufu24vp3zfptdpscszkz7h4nm

Understanding TEE Containers, Easy to Use? Hard to Trust [article]

Weijie Liu, Hongbo Chen, XiaoFeng Wang, Zhi Li, Danfeng Zhang, Wenhao Wang, Haixu Tang
2021 arXiv   pre-print
We observe that none of the existing TEE containers can fulfill the goal they set, due to various pitfalls in their design and implementation.  ...  In this paper, we studied the isolation strategies of 15 existing TEE containers to protect secure applications from potentially malicious operating systems (OS) or untrusted applications, using a semi-automatic  ...  To improve the secure development of Tcons, a system call fuzzer and a suite of security benchmarks were proposed and implemented that are applicable to test those Tcons.  ... 
arXiv:2109.01923v1 fatcat:qgkbhnf6ffb7tmdygv2jsowjty

Virtual Breakpoints for x86/64 [article]

Gregory Michael Price
2019 arXiv   pre-print
This design incorporates lessons learned from 50 years of virtualization and debugger design to deliver fast, reliable trapping without the pitfalls of traditional binary modification.  ...  In this paper we demonstrate the fundamental abstraction failures of current trapping methods, and design a new mechanism from the hardware up.  ...  Introduction In the modern age of malware analysis and "fuzzing for dollars", security researchers are still seeking a robust, transparent, efficient instruction trapping system.  ... 
arXiv:1801.09250v3 fatcat:pil46hghefheffjuultppzqb6i

ARMlock

Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Our security assessment and performance measurement show that ARMlock is practical, effective, and efficient.  ...  For example, they can use self-modifying code, receive exceptions, and make system calls. Moreover, system calls can be interposed by ARMlock to enforce the policies set by the host.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the FSU and NSFC.  ... 
doi:10.1145/2660267.2660344 dblp:conf/ccs/ZhouWCW14 fatcat:5wdpcjiif5b2fke647hrr3o54a

Designing Robust API Monitoring Solutions [article]

Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro
2021 arXiv   pre-print
Tracing the sequence of library and system calls that a program makes is very helpful in the characterization of its interactions with the surrounding environment and ultimately of its semantics.  ...  building API tracers for software security research.  ...  The variant ships as a highlevel library suitable either for standalone usage as an inguest API monitoring tool or for being plugged in existing analysis systems based on Pin, which are numerous in security  ... 
arXiv:2005.00323v2 fatcat:37q5xujff5asdniseusognyfi4

The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization [article]

Bumjin Im
2021 arXiv   pre-print
Overall, we believe sub-process isolation is a must and that the Endokernel exposes an essential set of abstractions for realizing this in a simple and feasible way.  ...  Commodity applications contain more and more combinations of interacting components (user, application, library, and system) and exhibit increasingly diverse tradeoffs between isolation, performance, and  ...  Microbenchmarks System call overhead We evaluate Intravirt's overhead on system calls and signal delivery in comparison to native and the ptrace-based techniques.  ... 
arXiv:2108.03705v2 fatcat:tovxud33k5crnlpqmnsrd4mfmu

Extending ACID semantics to the file system

Charles P. Wright, Richard Spillane, Gopalan Sivathanu, Erez Zadok
2007 ACM Transactions on Storage  
In our prototype ACID file system, called Amino, updated applications can protect arbitrary sequences of system calls within a transaction.  ...  To solve these problems, a file system should allow a sequence of operations to be encapsulated in a single atomic transaction.  ...  Tzi-cker Chiueh, Alex Mohr, and Margo Seltzer, were generous of their time and provided significant helpful input and comments on the work. Rob Johnson, R. C.  ... 
doi:10.1145/1242520.1242521 fatcat:kswb7mmuifavxh4cychvykvg3a

Introduction: Transitions, Revolutions, and Reinventions: Discourses on Human Capabilities and World Configurations

Christian Matheis, Sascha Engel, Holly Jordan
2014 Spectra  
partial defense of Martha Nussbaum's and Amartya Sen's capability-based approach, which I think is uniquely situated to address the inequalities of the racial contract.  ...  Global relations are largely shaped by what Charles Mills calls "the racial contract": the sometimes explicit and sometimes unspoken agreement that social arrangements must favor whites over nonwhites.  ...  Maybe not a cause or an intent, but as much of a factor in the security practices, violent practices and reactions of the United States, especially in the 2000s, than a typical sort of national security  ... 
doi:10.21061/spectra.v3i1.213 fatcat:lim7ny76snhlthql5t3bpt7xqm

ECR 2011 Book of Abstracts - A - Postgraduate Educational Programme

2011 Insights into Imaging  
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3.  ...  Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation.  ...  an efficient problem-solving tool.  ... 
doi:10.1007/s13244-011-0078-3 pmid:23100070 pmcid:PMC3533621 fatcat:qa3ln4hhvve2hhumgwwnmykgoe

ECR 2016 Book of Abstracts - A - Postgraduate Educational Programme

2016 Insights into Imaging  
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3.  ...  Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation.  ...  an efficient problem-solving tool.  ... 
doi:10.1007/s13244-016-0474-9 pmid:26873353 pmcid:PMC4762839 fatcat:itxslbcacjhh3kixfkcwmdbt44

ECR 2015 Book of Abstracts - A - Postgraduate Educational Programme

2015 Insights into Imaging  
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3.  ...  Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation.  ...  an efficient problem-solving tool.  ... 
doi:10.1007/s13244-015-0386-0 pmid:25708993 pmcid:PMC4349897 fatcat:m7eyvqcwojfpvf3lr5hy6dwjb4

ECR 2013 Book of Abstracts - A - Postgraduate Educational Programme

2013 Insights into Imaging  
To learn how to practically implement these techniques in daily practice and to avoid pitfalls and artefacts. 3.  ...  Consumption of health (and imaging) services is influenced by the existence or the absence of a social security system in a nation.  ...  an efficient problem-solving tool.  ... 
doi:10.1007/s13244-013-0227-y pmid:23468009 pmcid:PMC3666656 fatcat:yitsk227mba2pl7wcypouf6tz4

Identity Boxing: A New Technique for Consistent Global Identity

D. Thain
ACM/IEEE SC 2005 Conference (SC'05)  
We have implemented identity boxing at the user level within a secure system-call interposition agent and applied it to a distributed storage and execution system.  ...  This forces each grid system to provide a mapping from global to local identities, creating a significant administrative burden and inhibiting many possibilities of data sharing.  ...  SECURITY AND CORRECTNESS System call trapping is a secure interposition method. If the mechanism is properly implemented, the child process is unable to escape the control of the supervisor.  ... 
doi:10.1109/sc.2005.34 dblp:conf/sc/Thain05 fatcat:a2qzkknrbfaojgszhugdtskvcq
« Previous Showing results 1 — 15 out of 268 results