Sciweavers

335 search results - page 5 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Improving architecture testability with patterns
There is a critical need for approaches to support software testing. Our research exploits the information described at Architectural Patterns to drive the definition of tests. As...
Roberta Coelho, Uirá Kulesza, Arndt von Sta...
CCECE
2006
IEEE
15 years 3 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...
94
Voted
ECEASST
2010
14 years 4 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
PAMI
2012
12 years 12 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw