Sciweavers

416 search results - page 2 / 84
» Some new approaches for preventing software tampering
Sort
View
ICASSP
2009
IEEE
13 years 7 months ago
Tampering identification using Empirical Frequency Response
With the widespread popularity of digital images and the presence of easy-to-use image editing software, content integrity can no longer be taken for granted, and there is a stron...
Wei-Hong Chuang, Ashwin Swaminathan, Min Wu
SOCIALCOM
2010
12 years 10 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
AC
2002
Springer
13 years 3 months ago
Software Fault Prevention by Language Choice: Why C is Not My Favorite Language
How much does the choice of a programming language influence the prevalence of bugs in the resulting code? It seems obvious that at the level at which individuals write new progra...
Richard J. Fateman
TC
1998
13 years 3 months ago
Analysis of Preventive Maintenance in Transactions Based Software Systems
—Preventive maintenance of operational software systems, a novel technique for software fault tolerance, is used specifically to counteract the phenomenon of software “aging....
Sachin Garg, Antonio Puliafito, Miklós Tele...
EUROCRYPT
2007
Springer
13 years 9 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz