Dannie M. Stanley

Learn More
The vast majority of hosts on the Internet, including mobile clients, are running on one of three major operating system families. Malicious operating system kernel software, such as the code introduced by a kernel rootkit, is strongly dependent on the organization of the victim operating system. Due to the lack of diversity of operating systems, attackers(More)
• Static objects are identified using kernel-exported mapping information. • Dynamic object [de]allocations are reported by annotated kernel memory functions with hypercalls. • Memory ranges are extracted from function arguments and return values. • Call stack information is used to derive data types. • Pages that contain allocated kernel objects are(More)
The interaction of Zn2+ with angiotensin I, a decapeptide containing two histidyl residues, has been studied by 1H-NMR spectroscopy in both water and dimethylsulfoxide. When Zn2+ is added to the peptide in dimethylsulfoxide, binding occurs by coordination of the imidazole rings of both histidines to the metal-ion, enabling the deprotonation of the Phe(More)
"The education of all software engineering students must include student experiences with the professional practice of software engineering." There have been many models proposed to include professional practice in computer science and software engineering curricula. Some schools simulate professional practice in the classroom with large term or multi-term(More)
ii To my wife, my parents, and my children. iii ACKNOWLEDGMENTS I would like to express my deep appreciation and gratitude to my advisors Dr. and the many wonderful opportunities that they afforded me. I am fortunate to have the opportunity to learn from such highly respected and accomplished mentors. would also like to thank my additional committee members(More)
  • 1