7 research outputs found

    A Framework to Secure Peripherals at Runtime

    No full text

    Transitional Patterns of Adolescent Females in Non-traditional Career Paths

    No full text
    In this study, focus groups (n = 13) were utilized to examine the factors that affected the career decision-making of adolescent females and young women in undergraduate science, engineering, and technology programs. The 51 participants included students from colleges, technical institutes, and universities in Alberta. Qualitative analysis (cf. Vaughn, Schumm, & Sinagub, 1996) was used to uncover seven themes: (a) transition from high school, (b) educational influences, (c) family influences, (d) academic issues, (e) coursework management, (f) gender issues, and (g) creating a successful student environment. Implications for career development theory, education, counselling, and for future research are discussed.Dans cette étude, les auteurs ont observé des groupes de réflexion (n = 13) afin de déterminer les facteurs influençant le choix de carrière des adolescentes et jeunes femmes suivant des programmes universitaires de premier cycle de sciences, d'ingénierie et de technologie. Les 51 participants comprenaient des étudiantes inscrites dans des collèges, des instituts techniques et des universités d'Alberta. Les auteurs ont pu identifier, grâce à l'analyse qualitative, (voir Vaughn, Schumm et Sinagub, 1996) sept thèmes : a) transition à partir de l'école secondaire, b) influences éducatives, c) influences familiales, d) questions sociales, e) gestion des devoirs, f) questions liées aux différences entre les sexes et g) création d'un milieu favorable au succès scolaire. Finalement, cet article discute des implications découlant de cette étude pour la théorie du perfectionnement professionnel, l'éducation, le counseling et pour les recherches futures

    Modular Verification of Programs with Effects and Effect Handlers in Coq

    Get PDF
    International audienceModern computing systems have grown in complexity, and the attack surface has increased accordingly. Even though system components are generally carefully designed and even verified by different groups of people, the composition of these components is often regarded with less attention. This paves the way for " architectural attacks " , a class of security vulnerabilities where the attacker is able to threaten the security of the system even if each of its components continues to act as expected. In this article, we introduce FreeSpec, a formalism built upon the key idea that components can be modelled as programs with algebraic effects to be realized by other components. FreeSpec allows for the modular modelling of a complex system, by defining idealized components connected together, and the modular verification of the properties of their composition. In addition, we have implemented a framework for the Coq proof assistant based on FreeSpec

    Hypervisor Memory Forensics

    No full text
    Abstract. Memory forensics is the branch of computer forensics that aims at extracting artifacts from memory snapshots taken from a running system. Even though it is a relatively recent field, it is rapidly growing and it is attracting considerable attention from both industrial and academic researchers. In this paper, we present a set of techniques to extend the field of memory forensics toward the analysis of hypervisors and virtual machines. With the increasing adoption of virtualization techniques (both as part of the cloud and in normal desktop environments), we believe that memory forensics will soon play a very important role in many investigations that involve virtual environments. Our approach, implemented in an open source tool as an extension of the Volatility framework, is designed to detect both the existence and the characteristics of any hypervisor that uses the Intel VT-x technology. It also supports the analysis of nested virtualization and it is able to infer the hierarchy of multiple hypervisors and virtual machines. Finally, by exploiting the techniques presented in this paper, our tool can reconstruct the address space of a virtual machine in order to transparently support any existing Volatility plugin- allowing analysts to reuse their code for the analysis of virtual environments
    corecore