Vrigar Technologies Ltd

Displaying 1-10 of 10 results

  • White Papers // May 2012

    Body Armor for Binaries: Preventing Buffer Overflows without Recompilation

    BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. The authors' approach hardens binaries against both kinds of overflow, without requiring the programs' source...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2012

    System-Level Support for Intrusion Recovery

    Recovering from attacks is hard and gets harder as the time between the initial infection and its detection increases. Which files did the attackers modify? Did any of user data depend on malicious inputs? Can the user still trust their own documents or binaries? When malcode has been active for...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2011

    Minemu: The World's Fastest Taint Tracker

    Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with typical overheads of an order of magnitude, current implementations are not suitable for most production systems. The research question the authors address in this paper is whether the slow-down is a fundamental speed barrier, or an...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2010

    The Smartphone and the Cloud: Power to the User

    In the last decade the people have seen a shift in the use of computers. Their personal computers no longer stand on the desks in their homes, but are located in the pockets of their trousers. They use these pocket devices, called Smartphone's, to access their multimedia data, to communicate...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2010

    Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds

    In recent years, the application of high-performance and distributed computing in scientific practice has become increasingly wide-spread. Among the most widely available platforms to scientists are clusters, grids, and cloud systems. Such infrastructures currently are undergoing revolutionary change due to the integration of many-core technologies, providing orders-of-magnitude speed improvements for...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2009

    Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks

    The authors consider multi-resolution storage, a technique for providing scalable adaptive data fidelity, necessary for many applications of large Wireless Sensor Networks (WSNs). Although the previously proposed design of multi-resolution storage, based on quad trees and geographic routing, is conceptually simple, it exhibits inherent problems if applied to real-world WSNs....

    Provided By Vrigar Technologies Ltd

  • White Papers // Jan 2009

    Multi-Hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols

    Multi-hop cluster hierarchy has been presented as an organization for large Wireless Sensor Networks (WSNs) that can provide scalable routing, data aggregation, and querying. In this paper, the authors revisit the fundamental problem of maintenance of such a hierarchy. To this end, they observe that, due to tightly coupling their...

    Provided By Vrigar Technologies Ltd

  • White Papers // Feb 2007

    A Hybrid PKI-IBC Based Ephemerizer System

    The concept of an ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The principle involved storing the data in an encrypted form in the user's machine and the key to decrypt the data in a...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2006

    Towards a Reference Ontology for Business Models

    Ontologies are viewed as increasingly important tools for structuring domains of interests. In this paper, the authors propose reference ontology of business models using concepts from three established business model ontologies; the REA, BMO, and e3-value. The basic concepts in the reference ontology concern actors, resources, and the transfer of...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2006

    Supporting Reconfigurable Parallel Multimedia Applications

    Programming multimedia applications for System-on-Chip (SoC) architectures is difficult because streaming communication, user event handling, reconfiguration, and parallelism have to be dealt with. The authors present Hinch, a runtime system for multimedia applications that efficiently exploits parallelism by running the application in a dataflow style. The application has to be...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2012

    System-Level Support for Intrusion Recovery

    Recovering from attacks is hard and gets harder as the time between the initial infection and its detection increases. Which files did the attackers modify? Did any of user data depend on malicious inputs? Can the user still trust their own documents or binaries? When malcode has been active for...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2011

    Minemu: The World's Fastest Taint Tracker

    Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with typical overheads of an order of magnitude, current implementations are not suitable for most production systems. The research question the authors address in this paper is whether the slow-down is a fundamental speed barrier, or an...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2010

    Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds

    In recent years, the application of high-performance and distributed computing in scientific practice has become increasingly wide-spread. Among the most widely available platforms to scientists are clusters, grids, and cloud systems. Such infrastructures currently are undergoing revolutionary change due to the integration of many-core technologies, providing orders-of-magnitude speed improvements for...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2006

    Towards a Reference Ontology for Business Models

    Ontologies are viewed as increasingly important tools for structuring domains of interests. In this paper, the authors propose reference ontology of business models using concepts from three established business model ontologies; the REA, BMO, and e3-value. The basic concepts in the reference ontology concern actors, resources, and the transfer of...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2012

    Body Armor for Binaries: Preventing Buffer Overflows without Recompilation

    BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. The authors' approach hardens binaries against both kinds of overflow, without requiring the programs' source...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2006

    Supporting Reconfigurable Parallel Multimedia Applications

    Programming multimedia applications for System-on-Chip (SoC) architectures is difficult because streaming communication, user event handling, reconfiguration, and parallelism have to be dealt with. The authors present Hinch, a runtime system for multimedia applications that efficiently exploits parallelism by running the application in a dataflow style. The application has to be...

    Provided By Vrigar Technologies Ltd

  • White Papers // Feb 2007

    A Hybrid PKI-IBC Based Ephemerizer System

    The concept of an ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The principle involved storing the data in an encrypted form in the user's machine and the key to decrypt the data in a...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2010

    The Smartphone and the Cloud: Power to the User

    In the last decade the people have seen a shift in the use of computers. Their personal computers no longer stand on the desks in their homes, but are located in the pockets of their trousers. They use these pocket devices, called Smartphone's, to access their multimedia data, to communicate...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2009

    Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks

    The authors consider multi-resolution storage, a technique for providing scalable adaptive data fidelity, necessary for many applications of large Wireless Sensor Networks (WSNs). Although the previously proposed design of multi-resolution storage, based on quad trees and geographic routing, is conceptually simple, it exhibits inherent problems if applied to real-world WSNs....

    Provided By Vrigar Technologies Ltd

  • White Papers // Jan 2009

    Multi-Hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols

    Multi-hop cluster hierarchy has been presented as an organization for large Wireless Sensor Networks (WSNs) that can provide scalable routing, data aggregation, and querying. In this paper, the authors revisit the fundamental problem of maintenance of such a hierarchy. To this end, they observe that, due to tightly coupling their...

    Provided By Vrigar Technologies Ltd