Sciweavers

331 search results - page 2 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
HOTOS
2003
IEEE
13 years 10 months ago
Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection
Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of bot...
Emmett Witchel, Krste Asanovic
CSREAESA
2007
13 years 6 months ago
IT Security Protection at Field Level of Industrial Automation Systems
—Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field...
Felix Gutbrodt
CSMR
1998
IEEE
13 years 9 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
EDCC
2010
Springer
13 years 10 months ago
Towards Understanding the Importance of Variables in Dependable Software
Abstract—A dependable software system contains two important components, namely, error detection mechanisms and error recovery mechanisms. An error detection mechanism attempts t...
Matthew Leeke, Arshad Jhumka
ACMSE
2006
ACM
13 years 11 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen