Daniel Chappell10
Peter Conzen6
Bernhard F Becker6
10Daniel Chappell
6Peter Conzen
6Bernhard F Becker
Learn More
Executing binaries without interference by an outside adversary has been an ongoing duel between protection methods and attacks. Recently, an efficient kernel-patch attack has been presented against commonly used self-checking code techniques that use checksumming ahead of execution. While methods based on self-modifying code can defend against this attack,(More)
– Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web browsing behavior of a large number of clients, and target expensive higher-layer resources such as CPU, database and(More)
We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under(More)
Java is often accused of being too slow for serious programming, especially for scientiic problem solving. However, we found that for a large-scale geophysical application, Java code compiled with current just-in-time compilers runs slower than Fortran by a factor of at most four, on both a shared-memory parallel machine (SGI Origin2000) and a(More)
Generational garbage collection divides a heap up into two or more generations, and usually collects a youngest generation most frequently. Collection of the youngest generation requires identification of pointers into that generation from older generations; a data structure that supports such identification is called a remembered set. Various remembered(More)
INTRODUCTION Isotonic crystalloids play a central role in perioperative fluid management. Isooncotic preparations of colloids (for example, human albumin or hydroxyethyl starch) remain nearly completely intravascular when infused to compensate for acute blood losses. Recent data were interpreted to indicate a comparable intravascular volume effect for(More)
INTRODUCTION Postischemic injury to the coronary vascular endothelium, in particular to the endothelial glycocalyx, may provoke fluid extravasation. Shedding of the glycocalyx is triggered by redox stress encountered during reperfusion and should be alleviated by the radical scavenger nitric oxide (NO). The objective of this study was to investigate the(More)
BACKGROUND Small-volume resuscitation can rapidly correct hypovolemia. Hyperoncotic albumin solutions, long in clinical use, are suitable for small-volume resuscitation; however, their clinical benefits remain uncertain. METHODS Randomized clinical trials comparing hyperoncotic albumin with a control regimen for volume expansion were sought by multiple(More)
INTRODUCTION Metabolic acidosis during hemorrhagic shock is common and conventionally considered to be due to hyperlactatemia. There is increasing awareness, however, that other nonlactate, unmeasured anions contribute to this type of acidosis. METHODS Eleven anesthetized dogs were hemorrhaged to a mean arterial pressure of 45 mm Hg and were kept at this(More)
We present a new approach to individualize programs at the machine-and byte-code levels. Our superdiversification methodology is based on the compiler technique of superoptimization, which performs a brute-force search over all possible short instruction sequences to find minimum-size implementations of desired functions. Superdiversification also searches(More)