Sciweavers

192 search results - page 2 / 39
» Non-Deterministic Games and Program Analysis: An Application...
Sort
View
CCS
2011
ACM
12 years 4 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
DIGRA
2005
Springer
13 years 10 months ago
Game Engineering for a Multiprocessor Architecture
This paper explores the idea that future game consoles and computers may no longer be single processor units, but instead symmetrical multiprocessor units. If this were to occur g...
Abdennour El Rhalibi, Steve Costa, David England
ICALP
2001
Springer
13 years 9 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
OOPSLA
2005
Springer
13 years 10 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
ECOOPW
2006
Springer
13 years 8 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo