Publication
Non-Control-Data Attacks Are Realistic Threats
Publication
Pebbling and Proofs of Work
Video
Friendly Virtual Machines: Leveraging a Feedback-Control Model for Application Adaptation
With the increased use of “Virtual Machines” (VMs) as vehicles that isolate applications running on the same host, it is necessary to devise techniques that enable multiple VMs to share underlying resources both fairly and…
Microsoft Research Blog
Keeping E-Mail Safe: Microsoft Co-Sponsors Conference on E-Mail and Anti-Spam
By Rob Knies, Managing Editor, Microsoft Research Joshua Goodman’s grandfather recently got himself a new computer. He’s a medical writer who had been accustomed to typing his columns and mailing them to his publishers. But…
Publication
On Privacy-Preserving Histograms
Publication
A Semantics for Web Services Authentication
Publication
Access Control in a World of Software Diversity
Publication