Sciweavers

624 search results - page 96 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
SIGSOFT
1998
ACM
15 years 4 months ago
Reengineering Class Hierarchies Using Concept Analysis
The design of a class hierarchy may be imperfect. For example, a class C may contain a member m not accessed in any C-instance, an indication that m could be eliminated, or moved ...
Gregor Snelting, Frank Tip
ICSE
2009
IEEE-ACM
16 years 18 days ago
Automatically finding patches using genetic programming
Automatic repair of programs has been a longstanding goal in software engineering, yet debugging remains a largely manual process. We introduce a fully automated method for locati...
Westley Weimer, ThanhVu Nguyen, Claire Le Goues, S...
JOC
2010
92views more  JOC 2010»
14 years 6 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
ICSE
2005
IEEE-ACM
15 years 12 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
SBACPAD
2004
IEEE
93views Hardware» more  SBACPAD 2004»
15 years 1 months ago
FlowCert : Probabilistic Certification for Peer-to-Peer Computations
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of nodes for computing parallel applications. At this scale, it raises the problem o...
Sébastien Varrette, Jean-Louis Roch, Franck...