- Full text PDF available (36)
- This year (2)
- Last 5 years (15)
- Last 10 years (27)
Journals and Conferences
Online safety is everyone's responsibility---a concept much easier to preach than to practice.
Crimeware-as-a-service (CaaS) has become a prominent component of the underground economy. CaaS provides a new dimension to cyber crime by making it more organized, automated, and accessible to criminals with limited technical skills. This paper dissects CaaS and explains the essence of the underground economy that has grown around it. The paper also… (More)
Targeted cyberattacks play an increasingly significant role in disrupting the online social and economic model, not to mention the threat they pose to nation-states. A variety of components and techniques come together to bring about such attacks.
Parallel processing systems have an advantage over traditional supercomputers in price/performance, but traditional supercomputers retain a signiicant advantage over parallel processing systems in the area of exibility. Traditional supercomputers can easily handle a mix of interactive, batch, scalar, vector, parallel, and large memory jobs simultaneously… (More)
How suitable is a Python-based CS1 course as preparation for a C++-based CS2 course? After fifteen years of using C++ for both CS1 and CS2, the Computer Science Department at Michigan State University changed the CS1 course to Python. This paper examines the impact of that change on the second course in the sequence, CS2, which kept C++ as its primary… (More)
We study the on-line caching problem in a <i>restricted</i> cache where each memory item can be placed in only a restricted subset of cache locations. Examples of restricted caches in practice include victim caches, assist caches, and skew caches. To the best of our knowledge, all previous on-line caching studies have considered on-line caching in… (More)
Buffer overflow attacks persist in spite of advances in software engineering. Numerous prevention schemes in software have been developed over the years, but so have techniques to circumvent them. Recently, improved schemes have appeared which are entirely in hardware or require hardware modifications to support them. In this paper we describe how to defeat… (More)