Sciweavers

4 search results - page 1 / 1
» Insecurity by contract
Sort
View
IASTEDSEA
2004
13 years 6 months ago
Insecurity by contract
Design by Contract is a design methodology that promotes software reliability and reusability by requiring each component module to have a well-specified interface and leaves a mo...
Phillip L. Nico, Clark Savage Turner, Kimberly Kno...
STOC
2007
ACM
136views Algorithms» more  STOC 2007»
14 years 5 months ago
Exponential separations for one-way quantum communication complexity, with applications to cryptography
We give an exponential separation between one-way quantum and classical communication protocols for two partial Boolean functions, both of which are variants of the Boolean Hidden...
Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SP
2007
IEEE
13 years 11 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...