Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
This paper presents TORNADO, a unique input replay tool based on system call replay. It is capable of tracing program executions with an acceptable overhead of less than a factor 2...
Frank Cornelis, Michiel Ronsse, Koenraad De Bossch...