Sciweavers

170 search results - page 1 / 34
» Externally verifiable code execution
Sort
View
CACM
2006
64views more  CACM 2006»
13 years 4 months ago
Externally verifiable code execution
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
SOSP
2005
ACM
14 years 1 months ago
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure...
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perr...
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 8 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
APLAS
2003
ACM
13 years 8 months ago
Executing Verified Compiler Specification
Abstract. Much work has been done in verifying a compiler specification, both in hand-written and mechanical proofs. However, there is still a gap between a correct compiler specif...
Koji Okuma, Yasuhiko Minamide
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 1 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee