Sciweavers

30 search results - page 5 / 6
» Graph Theoretic Software Watermarks: Implementation, Analysi...
Sort
View
CCS
2007
ACM
14 years 5 days ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
ICSM
2005
IEEE
13 years 11 months ago
Static Analysis of Object References in RMI-Based Java Software
Distributed applications provide numerous advantages related to software performance, reliability, interoperability, and extensibility. This paper focuses on distributed Java prog...
Mariana Sharp, Atanas Rountev
DATE
2009
IEEE
189views Hardware» more  DATE 2009»
14 years 23 days ago
CUFFS: An instruction count based architectural framework for security of MPSoCs
—Multiprocessor System on Chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to caus...
Krutartha Patel, Sri Parameswaran, Roshan G. Ragel
ESSOS
2010
Springer
14 years 2 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
SIGSOFT
2003
ACM
14 years 6 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...