Sciweavers

43 search results - page 3 / 9
» Retrofitting Legacy Code for Security
Sort
View
ENTCS
2008
87views more  ENTCS 2008»
13 years 5 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
DIMVA
2010
13 years 6 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
ESSOS
2010
Springer
14 years 2 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
OSDI
2008
ACM
14 years 5 months ago
Leveraging Legacy Code to Deploy Desktop Applications on the Web
Xax is a browser plugin model that enables developers to leverage existing tools, libraries, and entire programs to deliver feature-rich applications on the web. Xax employs a nov...
John R. Douceur, Jeremy Elson, Jon Howell, Jacob R...
ICST
2008
IEEE
13 years 11 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...