Zobrazeno 1 - 10
of 415
pro vyhledávání: '"Larsen, Per"'
Autor:
Penke, Melanie, Larsen, Per S., Schuster, Susanne, Dall, Morten, Jensen, Benjamin A.H., Gorski, Theresa, Meusel, Andrej, Richter, Sandy, Vienberg, Sara G., Treebak, Jonas T., Kiess, Wieland, Garten, Antje
Nicotinamide phosphoribosyltransferase (Nampt) is the rate-limiting enzyme for NAD salvage and the abundance of Nampt has been shown to be altered in non-alcoholic fatty liver disease. It is, however, unknown how hepatic Nampt is regulated in respons
Externí odkaz:
https://ul.qucosa.de/id/qucosa%3A38585
https://ul.qucosa.de/api/qucosa%3A38585/attachment/ATT-0/
https://ul.qucosa.de/api/qucosa%3A38585/attachment/ATT-0/
Multi-variant execution (MVX) systems amplify the effectiveness of software diversity techniques. The key idea is to run multiple diversified program variants in lockstep while providing them with the same input and monitoring their run-time behavior
Externí odkaz:
http://arxiv.org/abs/2011.02091
Autor:
Voulimeneas, Alexios, Song, Dokyung, Parzefall, Fabian, Na, Yeoul, Larsen, Per, Franz, Michael, Volckaert, Stijn
N-Variant Execution (NVX) systems utilize software diversity techniques for enhancing software security. The general idea is to run multiple different variants of the same program alongside each other while monitoring their run-time behavior. If the
Externí odkaz:
http://arxiv.org/abs/1903.03643
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Song, Dokyung, Lettner, Julian, Rajasekaran, Prabhu, Na, Yeoul, Volckaert, Stijn, Larsen, Per, Franz, Michael
The C and C++ programming languages are notoriously insecure yet remain indispensable. Developers therefore resort to a multi-pronged approach to find security issues before adversaries. These include manual, static, and dynamic program analysis. Dyn
Externí odkaz:
http://arxiv.org/abs/1806.04355
Sanitizers can detect security vulnerabilities in C/C++ code that elude static analysis. Current practice is to continuously fuzz and sanitize internal pre-release builds. Sanitization-enabled builds are rarely released publicly. This is in large par
Externí odkaz:
http://arxiv.org/abs/1711.08108
Autor:
Wenzel, Michaela, Gulsoy, Ilkay N. Celik, Gao, Yongqiang, Teng, Zihao, Willemse, Joost, Middelkamp, Martijn, van Rosmalen, Mariska G. M., Larsen, Per W. B., van der Wel, Nicole N., Wuite, Gijs J. L., Roos, Wouter H., Hamoen, Leendert W.
Publikováno v:
Proceedings of the National Academy of Sciences of the United States of America, 2021 Jan 01. 118(2), 1-9.
Externí odkaz:
https://www.jstor.org/stable/27005957
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Multi-Variant Execution Environments (MVEEs) are a promising technique to protect software against memory corruption attacks. They transparently execute multiple, diversified variants (often referred to as replicae) of the software receiving the same
Externí odkaz:
http://arxiv.org/abs/1607.07841