Sciweavers

47 search results - page 3 / 10
» Per-Input Control-Flow Integrity
Sort
View
ISW
2010
Springer
13 years 3 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
LISP
2002
81views more  LISP 2002»
13 years 5 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
ESOP
2006
Springer
13 years 9 months ago
Path Optimization in Programs and Its Application to Debugging
We present and solve a path optimization problem on programs. Given a set of program nodes, called critical nodes, we find a shortest path through the program's control flow g...
Akash Lal, Junghee Lim, Marina Polishchuk, Ben Lib...
IEEESCC
2009
IEEE
13 years 3 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
CAISE
2006
Springer
13 years 9 months ago
Integration of heterogeneous BPM Schemas: The Case of XPDL and BPEL
Heterogeneous Business Process Modeling (BPM) schemas have been a problem for business process management throughout the last couple of years. Although there are several standardiz...
Thomas Hornung, Agnes Koschmider, Jan Mendling