Sciweavers

5578 search results - page 1 / 1116
» Base Class Injection
Sort
View
GCSE
2001
Springer
13 years 9 months ago
Base Class Injection
Abstract. Class hierarchies, though theoretically reusable, have generally not seen much practical reuse in applications, due in part to the inflexibility of the inheritance relat...
Douglas Gregor, Sibylle Schupp, David R. Musser
USITS
2003
13 years 6 months ago
Using Fault Injection and Modeling to Evaluate the Performability of Cluster-Based Services
We propose a two-phase methodology for quantifying the performability (performance and availability) of cluster-based Internet services. In the first phase, evaluators use a fault...
Kiran Nagaraja, Xiaoyan Li, Ricardo Bianchini, Ric...
PRDC
2009
IEEE
13 years 11 months ago
Evaluating the Use of Reference Run Models in Fault Injection Analysis
—Fault injection (FI) has been shown to be an effective approach to assessing the dependability of software systems. To determine the impact of faults injected during FI, a given...
Matthew Leeke, Arshad Jhumka
EDO
2005
Springer
13 years 10 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
ICISC
2008
129views Cryptology» more  ICISC 2008»
13 years 6 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar