Sciweavers

19 search results - page 3 / 4
» Idiosyncratic Signatures for Authenticated Execution of Mana...
Sort
View
ASPLOS
2006
ACM
13 years 11 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
ISSRE
2003
IEEE
13 years 10 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
SIGSOFT
2007
ACM
14 years 6 months ago
Using groupings of static analysis alerts to identify files likely to contain field failures
In this paper, we propose a technique for leveraging historical field failure records in conjunction with automated static analysis alerts to determine which alerts or sets of ale...
Mark Sherriff, Sarah Smith Heckman, J. Michael Lak...
ADBIS
2005
Springer
101views Database» more  ADBIS 2005»
13 years 10 months ago
Conceptual Content Management for Software Engineering Processes
A major application area of information systems technology and multimedia content management is that of support systems for engineering processes. This includes the particularly im...
Sebastian Bossung, Hans-Werner Sehring, Michael Sk...
PPPJ
2004
ACM
13 years 10 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi