Now showing items 1-2 of 2
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Time-resolved flow dynamics and Reynolds number effects at a wall-cylinder junction
(Cambridge University Press, 2015-07-13)
This study investigated the physics of separated turbulent flows near the vertical intersection of a flat wall with a cylindrical obstacle. The geometry imposes an adverse pressure gradient on the incoming boundary layer. ...