Sciweavers

127 search results - page 3 / 26
» Quantifying information leaks in software
Sort
View
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
13 years 9 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
EUROCRYPT
2004
Springer
13 years 11 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
POPL
2007
ACM
14 years 6 months ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
SCAM
2005
IEEE
13 years 11 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
PAMI
2012
11 years 8 months ago
Quantifying and Transferring Contextual Information in Object Detection
— Context is critical for reducing the uncertainty in object detection. However, context modelling is challenging because there are often many different types of contextual infor...
Wei-Shi Zheng, Shaogang Gong, Tao Xiang