Learn More
Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web browsing behavior of a large number of clients, and target expensive higher-layer resources such as CPU, database and(More)
– Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web browsing behavior of a large number of clients, and target expensive higher-layer resources such as CPU, database and(More)
BACKGROUND The astonishing thickness of the endothelial glycocalyx, which rivals that of endothelial cells in the microvasculature, was disclosed in the last 15 years. As already demonstrated, this structure plays a key role in the regulation of inflammation and vascular permeability. METHODS AND RESULTS Two components of the glycocalyx, syndecan-1 and(More)
The aims of severe perioperative bleeding management are three-fold. First, preoperative identification by anamesis and laboratory testing of those patients for whom the perioperative bleeding risk may be increased. Second, implementation of strategies for correcting preoperative anaemia and stabilisation of the macro- and microcirculations in order to(More)
The Java programming environment is increasingly being used to build large-scale multi-language applications. Whether these applications combine Java with other languages for legacy reasons, to address performance concerns, or to add Java functionality to preexisting server environments, they require correct and eecient native i n terfaces. This paper(More)
We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under(More)
Damage of the endothelial glycocalyx, which ranges from 200 to 2000 nm in thickness, decreases vascular barrier function and leads to protein extravasation and tissue oedema, loss of nutritional blood flow, and an increase in platelet and leucocyte adhesion. Thus, its protection or the restoration of an already damaged glycocalyx seems to be a promising(More)
Executing binaries without interference by an outside adversary has been an ongoing duel between protection methods and attacks. Recently, an efficient kernel-patch attack has been presented against commonly used self-checking code techniques that use checksumming ahead of execution. While methods based on self-modifying code can defend against this attack,(More)
A healthy vascular endothelium is coated by the endothelial glycocalyx. Its main constituents are transmembrane syndecans and bound heparan sulphates. This structure maintains the physiological endothelial permeability barrier and prevents leukocyte and platelet adhesion, thereby mitigating inflammation and tissue oedema. Heparinase, a bacterial analogue to(More)
Java is often accused of being too slow for serious programming, especially for scientiic problem solving. However, we found that for a large-scale geophysical application, Java code compiled with current just-in-time compilers runs slower than Fortran by a factor of at most four, on both a shared-memory parallel machine (SGI Origin2000) and a(More)