Sciweavers

786 search results - page 104 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
118
Voted
ICSE
2009
IEEE-ACM
16 years 4 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
131
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
VEE
2009
ACM
107views Virtualization» more  VEE 2009»
15 years 10 months ago
Architectural support for shadow memory in multiprocessors
Runtime monitoring support serves as a foundation for the important tasks of providing security, performing debugging, and improving performance of applications. Often runtime mon...
Vijay Nagarajan, Rajiv Gupta
135
Voted
IWMM
2010
Springer
173views Hardware» more  IWMM 2010»
15 years 8 months ago
CETS: compiler enforced temporal safety for C
Temporal memory safety errors, such as dangling pointer dereferences and double frees, are a prevalent source of software bugs in unmanaged languages such as C. Existing schemes t...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
136
Voted
ICAC
2005
IEEE
15 years 9 months ago
AutoPod: Unscheduled System Updates with Zero Data Loss
Patching, upgrading, and maintaining operating system software is a growing management complexity problem that can result in unacceptable system downtime. We introduce AutoPod, a ...
Shaya Potter, Jason Nieh