This paper preserits an experirnental study which shows that, for the Intel x86 architecture, single-bit control flow errors in the autherificntiori sectioris of targeted upplications can result in sigriijicant security vulnerabilities. The experinietit targets two well-known Ititernet server upplicutioris: FTP and SSH (secure shell), injecting sitigle-bit controljow errors into user authentication sections of the applications. The injected sections constitute approximately 2-896 of the te,rt segment of the target applications. The results show that out of all activated errors ( a ) I-2% conipromised sj'stenr security (create a permanent window of vulnerability), (b) 4342% resulted in crash failures (about 8.5% of these errors create a transient window of vulnerability), and (c) 7-12% resulted in fail silence violations. A ke). reasoli for the rrieasured securio, vulnerabilities is that, in the x86 architecture, coiiditional branch instructions are U ininitmiin of one Haniniing distance apart. The design and evaluution of U new ericoding schenie that reduces or eliminates this problem is presented.
P u b lic r e p o rtin g b u r d e n f o r th is c o lle c tio n o f in fo rm a tio n is e s tim a te d to a v e r a g e 1 h o u r p e r re s p o n s e , in c lu d in g th e tim e fo r re v ie w in g in s tru c tio n s , s e a r c h in g e x is tin g d a ta s o u r c e s , g a th e r in g a n d m a in ta in in g t h e d a ta n e e d e d , a n d c o m p le tin g a n d re v ie w in g th e c o lle c tio n o f in fo r m a tio n . S e n d c o m m e n t re g a rd in g th is b u rd e n e s tim a te o r a n y o th e r a s p e c t o f th is c o lle c tio n o f in fo r m a tio n , in c lu d in g s u g g e s tio n s fo r re d u c in g th is b u rd e n , to W a s h in g to n H e a d q u a rte rs S e r v ic e s . D ir e c to ra te fo r in fo rm a tio n O p e r a tio n s a n d R e p o rts , 1 2 1 5 J e ffe r s o n D a v is H ig h w a y , S u ite 1 2 0 4 , A r lin g to n , V A 2 2 2 0 2 -4 3 0 2 , a n d to th e O ffic e o f M a n a g e m e n t a n d B u d g e t, P a p e rw o rk R e d u c tio n P ro je c t (0 7 0 4 -0 1 8 8 ), W a s h in g to n , D C 2 0 5 0 3 . Geographically dispersed deployments of large and complex multitier enterprise applications introduce many challenges, including those involved in predicting the impact of network latency on end-to-end transaction response times. Here, a measurement-based approach to quantifying this impact using a new metric called the "link gradient" is presented. A nonintrusive technique for measuring the link gradient in running systems using delay injection and spectral analysis is presented, along with experimental results on PlanetLab that demonstrate that the link gradient can be used to predict end-to-end responsiveness, even in new and untested application configurations. AGENCY USE ONLY (Leave blank) REPORT DATE 3. REPORT TYPE AND DATES COVERED August 2008 T IT L E A N D S U B T IT L E FUNDING NUMBERS SUBJECT TERMS AbstractGeographically dispersed deployments of large and com plex multitier enterprise applications introduce many challenges, including those involved in predicting the impact of network latency on end-to-end transaction re sponse times. Here, a measurement-based approach to quantifying this impact using a new metric called the link gradient is presented. A nonintrusive technique for mea suring the link gradient in running systems using delay injection and spectral analysis is presented, along with experimental results on PlanetLab that demonstrate that the link gradient can be used to predict end-to-end re sponsiveness, even in new and unknown application con figurations.
Using 13.3 fb −1 of e + e − data recorded with the CLEO II and CLEO II.V detector configurations at CESR, we have searched for f J (2220) decays to K 0 S K 0 S in untagged two-photon interactions. We report an upper limit on the product of the two-photon partial width and the branching fraction, Γ γγ B(f J (2220)→K 0 S K 0 S ) of less than 1.1 eV at the 95% confidence level; systematic uncertainties are included. This dataset is four times larger than that used in the previous CLEO publication.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.