Sciweavers

2957 search results - page 502 / 592
» Code analysis and CS-XML
Sort
View
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 10 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
TASE
2007
IEEE
15 years 10 months ago
Realizing Live Sequence Charts in SystemVerilog
The design of an embedded control system starts with an investigation of properties and behaviors of the process evolving within its environment, and an analysis of the requiremen...
Hai H. Wang, Shengchao Qin, Jun Sun 0001, Jin Song...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
Iterative Turbo Channel Estimation for OFDM System over Rapid Dispersive Fading Channel
— Current OFDM systems assume the channel is not time varying within one OFDM frame, and use channel estimates obtained from preamble or pilots for data symbols within the same f...
Ming Zhao 0001, Zhenning Shi, Mark C. Reed
135
Voted
ADAEUROPE
2007
Springer
15 years 10 months ago
Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar
In this article, we experiment a way to extend an Ada library called Cheddar. Cheddar provides a domain specific language. Programs written with this domain specific language can...
Frank Singhoff, Alain Plantec
CCS
2007
ACM
15 years 10 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...