Hardening (computing)

Known as: Hardening 
In computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1938-2017
05010015019382016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software defense that stops shellcode… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively… (More)
  • table 2
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most web applications contain security vulnerabilities. The simple and natural ways of creating a web application are prone to… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in… (More)
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents a technique to selectively engineer sequential or domino nodes in high performance circuits to improve soft… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a new fabrication sequence for integrated-silicon microstructures designed and manufactured in a conventional… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The web contains a large quantity of unstructured information. In many cases, it is possible to heuristically extract structured… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
As a developing discipline, research results in the field of human computer interaction (HCI) tends to be "soft". Many workers in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?