Sciweavers

518 search results - page 11 / 104
» Abstract Interpretation-Based Protection
Sort
View
WISA
2005
Springer
15 years 5 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...
CRITIS
2009
14 years 9 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
GLVLSI
2002
IEEE
108views VLSI» more  GLVLSI 2002»
15 years 4 months ago
Protected IP-core test generation
Design simplification is becoming necessary to respect the target time-to-market of SoCs, and this goal can be obtained by using predesigned IP-cores. However, their correct inte...
Alessandro Fin, Franco Fummi
INFOCOM
2012
IEEE
13 years 2 months ago
Enhanced wireless channel authentication using time-synched link signature
Abstract— Wireless link signature is a physical layer authentication mechanism, which uses the unique wireless channel characteristics between a transmitter and a receiver to pro...
Yao Liu, Peng Ning
POS
1994
Springer
15 years 3 months ago
Protection in Grasshopper: A Persistent Operating System
nt systems support a single storage abstraction in which all data may be created and manipulated in a uniform manner, regardless of its longevity. In such systems a protection mec...
Alan Dearle, Rex di Bona, James Farrow, Frans A. H...