MIT Libraries homeMIT Libraries logoDSpace@MIT

MIT
Search 
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • CSAIL Digital Archive
  • CSAIL Technical Reports (July 1, 2003 - present)
  • Search
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • CSAIL Digital Archive
  • CSAIL Technical Reports (July 1, 2003 - present)
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-6 of 6

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution 

Near, Joseph P.; Jackson, Daniel (2014-04-22)
Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...
Thumbnail

Whanaungatanga: Sybil-proof routing with social networks 

Lesniewski-Laas, Chris; Kaashoek, M. Frans (2009-09-24)
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
Thumbnail

Information Flow for Secure Distributed Applications 

Cheng, Winnie Wing-Yee (2009-08-27)
Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...
Thumbnail

Toward Secure Services from Untrusted Developers 

Brodsky, Micah Z. (Micah Zev); Efstathopoulos, Petros; Kaashoek, Frans; Kohler, Eddie; Krohn, Maxwell; e.a. (2007-08-06)
We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...
Thumbnail

Precise and Comprehensive Provenance Tracking for Android Devices 

Gordon, Michael; Eikenberry, Jordan; Eden, Anthony; Perkins, Jeff; Rinard, Martin (2019-11-19)
Detailed information about the paths that data take through a system is invaluable for understanding sources and behaviors of complex exfiltration malware. We present a new system, ClearScope, that tracks, at the level of ...
Thumbnail

Comprehensive Java Metadata Tracking for Attack Detection and Repair 

Perkins, Jeff; Eikenberry, Jordan; Coglio, Alessandro; Rinard, Martin (2019-11-19)
We present ClearTrack, a system that tracks 32 bits of metadata for each primitive value in Java programs to detect and nullify a range of vulnerabilities such as integer overflow and underflow vulnerabilities, SQL injection ...

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Discover

AuthorEikenberry, Jordan (2)Perkins, Jeff (2)Rinard, Martin (2)Brodsky, Micah Z. (Micah Zev) (1)Cheng, Winnie Wing-Yee (1)Coglio, Alessandro (1)Eden, Anthony (1)Efstathopoulos, Petros (1)Gordon, Michael (1)Jackson, Daniel (1)... View MoreSubject
security (6)
runtime instrumentation (2)confidentiality (1)debugging (1)decentralized information flow control (1)dht (1)distributed hash table (1)distributed systems (1)information flow control (1)integrity (1)... View MoreDate Issued2010 - 2019 (3)2007 - 2009 (3)Has File(s)Yes (6)

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries homeMIT Libraries logo

Find us on

Twitter Facebook Instagram YouTube RSS

MIT Libraries navigation

SearchHours & locationsBorrow & requestResearch supportAbout us
PrivacyPermissionsAccessibility
MIT
Massachusetts Institute of Technology
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.