Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3611149
Abstract: Security-Sensitive Objects (SSOs) are often critical components in the exploitation of Linux kernel memory corruption vulnerabilities. While existing research has advanced SSOs identification and classification, there remains a significant gap in systematically understanding how these…
read more here.
Keywords:
sensitive objects;
uncovering exploiting;
security sensitive;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2024.3489619
Abstract: With the rapid development of sixth-generation (6G) communication technology, global communication networks are moving towards the goal of comprehensive and seamless coverage. In particular, low earth orbit (LEO) satellites have become a critical component of…
read more here.
Keywords:
task;
security sensitive;
task offloading;
leo satellite ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Parallel and Distributed Systems"
DOI: 10.1109/tpds.2017.2678507
Abstract: With the wide deployment of cloud computing in many business enterprises as well as science and engineering domains, high quality security services are increasingly critical for processing workflow applications with sensitive intermediate data. Unfortunately, most…
read more here.
Keywords:
selective tasks;
intermediate data;
time;
security sensitive ... See more keywords