Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Information Security
A Specialization Toolkit To Increase The Diversity Of Operating Systems, Calton Pu, Andrew P. Black, Crispin Cowan, Jonathan Walpole, Charles Consel
A Specialization Toolkit To Increase The Diversity Of Operating Systems, Calton Pu, Andrew P. Black, Crispin Cowan, Jonathan Walpole, Charles Consel
Computer Science Faculty Publications and Presentations
Virus and worm attacks that exploit system implementation details can be countered with a diversified set of implementations. Furthermore, immune systems show that attacks from previously unknown organisms require effective dynamic response. In the Synthetix project, we have been developing a specialization toolkit to improve the performance of operating system kernels. The toolkit helps programmers generate and manage diverse specialized implementations of software modules. The Tempo-C specializer tool generates different versions for both compile-time and run-time specialization. We are now adapting the toolkit to improve operating system survivability against implementations attacks.
An On-The-Fly Decoding Technique For Reed-Solomon Codes, Yuan Xing Lee, Robert H. Deng, Eng Hean Koh
An On-The-Fly Decoding Technique For Reed-Solomon Codes, Yuan Xing Lee, Robert H. Deng, Eng Hean Koh
Research Collection School Of Computing and Information Systems
An on-the-fly error correction technique for double-byte-error-correction (DBEC) and triple-byte-error-detection (TBED) Reed-Solomon (RS) codes is presented in this paper. This new algorithm finds number of byte-errors (single byte-error, double-byte errors, and triple-byte errors) by simply testing the values of a few syndrome functions, and locates and corrects the byte-errors directly without using the standard iterative algorithms for finding the error location polynomial. More importantly, it neither suffers from malfunctions incurred in Deng-Costello algorithm (1987), nor requires syndrome re-calculation as in Koksal-Yucel's modification (1992). It is also much more simpler and faster than the original Deng-Costello algorithm. It has found applications …
Gnarly Rantings About The Hacker And The Ants, Rudy Rucker
Gnarly Rantings About The Hacker And The Ants, Rudy Rucker
SWITCH
The article is an excerpt from Rucker’s book “The Happy Mutant”. It begins with his reflection of his career with GoMotion. He discusses the relation that he saw between design and cyberspace. Later he discusses his experience with a game a colleague found on the net: a virtual world where player is an ant. He talks about the struggles he goes through in this virtual world because of game difficulty and poor visuals. He ties it all in with how the Silicon Valley works in a similar way, and is filled with hackers and programers all needing each other to …