Articles with "security sensitive" as a keyword



PREXP: Uncovering and Exploiting Security-Sensitive Objects in the Linux Kernel

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3611149

Abstract: Security-Sensitive Objects (SSOs) are often critical components in the exploitation of Linux kernel memory corruption vulnerabilities. While existing research has advanced SSOs identification and classification, there remains a significant gap in systematically understanding how these… read more here.

Keywords: sensitive objects; uncovering exploiting; security sensitive; security ... See more keywords

Security-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2024.3489619

Abstract: With the rapid development of sixth-generation (6G) communication technology, global communication networks are moving towards the goal of comprehensive and seamless coverage. In particular, low earth orbit (LEO) satellites have become a critical component of… read more here.

Keywords: task; security sensitive; task offloading; leo satellite ... See more keywords

Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Parallel and Distributed Systems"

DOI: 10.1109/tpds.2017.2678507

Abstract: With the wide deployment of cloud computing in many business enterprises as well as science and engineering domains, high quality security services are increasingly critical for processing workflow applications with sensitive intermediate data. Unfortunately, most… read more here.

Keywords: selective tasks; intermediate data; time; security sensitive ... See more keywords