In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hypervisor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.
Abstract. How to efficiently reduce the fuzzing data scale while assuring high fuzzing veracity and vulnerability coverage is a pivotal issue in program fuzz test. This paper proposes a new heuristic method for fuzzing data generation named with H-Fuzzing. H-Fuzzing achieves a high program execution path coverage by retrieving the static information and dynamic property from the program. Our experiments evaluate H-Fuzzing, Java Path Finder (JPF) and random fuzzing method. The evaluation results demonstrate that H-Fuzzing can use fewer iterations and testing time to reach more test path coverage compared with the other two methods.
This paper examines L2 learner variations in the context of massively multiplayer online games (MMOGs). MMOGs have gained much attention among CALL researchers because this particular game genre is perceived to promote informal, contextualized interaction in a learner's target language, including interaction with native speakers. However, there is little research on differences between L2 learners in terms of how they engage in language learning and use in the context of gameplay. Drawing on data from questionnaires, interviews, gaming sessions, and gaming journals, this paper argues that affordances of MMOGs must be understood in relation to the learner's history, ability, and preference within the social context of game play; L2 learners engage with various game discourses that align with their preferences of game play and goals of language learning. In closing, the paper discusses procedural challenges in conducting research on MMOGs and similar gaming contexts.
Data leakage prevention has recently become the most important concern for both personal users and corporate users. Most existing feasible data leakage preventers are built with the Dynamic Binary Instrumentation (DBI) technology. Such mechanism suffers from poor application compatibility issue, especially for the large scale ones. In this paper, we propose Gemini, an instrumentation-free approach, to track data propagation dynamically and then prevent data leakage. Gemini leverages the page fault interrupt mechanism of the operating system, instead of DBI, to track memory page accesses, and then thwart the data leakage. As a result, Gemini is application transparent, i.e., it solves the application compatibility issue. Besides, Gemini is implemented on the most prevalent operating system-Windows, while most of previous approaches are built on Linux. Our evaluation results demonstrate Gemini's feasibility and effectiveness.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.