Sciweavers

31 search results - page 5 / 7
» Assessing vulnerability exploitability risk using software p...
Sort
View
WSC
2007
15 years 4 months ago
Towards a user-centred road safety management method based on road traffic simulation
One of the most important gaps in road safety management practises is the lack of mature methods for estimating reliability. Road safety performance assessment systems have been d...
Andreas Gregoriades
142
Voted
EUROMICRO
2009
IEEE
15 years 6 months ago
Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs
Runtime quality of software, such as availability and throughput, depends on architectural factors and execution environment characteristics (e.g. CPU speed, network latency). Alth...
Anakreon Mentis, Panagiotis Katsaros, Lefteris Ang...
104
Voted
CCS
2005
ACM
15 years 8 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
118
Voted
MOBISYS
2011
ACM
14 years 5 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
FPL
1999
Springer
95views Hardware» more  FPL 1999»
15 years 6 months ago
FPGA Viruses
Programmable logic is widely used, for applications ranging from eld-upgradable subsystems to advanced uses such as recon gurable computing platforms which are modi able at run-tim...
Ilija Hadzic, Sanjay Udani, Jonathan M. Smith