Sciweavers

28 search results - page 2 / 6
» Efficient Algorithmic Safety Analysis of HRU Security Models
Sort
View
80
Voted
ESORICS
2006
Springer
15 years 1 months ago
Timing-Sensitive Information Flow Analysis for Synchronous Systems
Timing side channels are a serious threat to the security of cryptographic algorithms. This paper presents a novel method for the timing-sensitive analysis of information flow in s...
Boris Köpf, David A. Basin
86
Voted
APLAS
2008
ACM
15 years 6 days ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
70
Voted
AINA
2007
IEEE
15 years 4 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
95
Voted
CAV
2008
Springer
108views Hardware» more  CAV 2008»
15 years 6 days ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
98
Voted
AMDO
2006
Springer
15 years 1 months ago
Efficient Incorporation of Motionless Foreground Objects for Adaptive Background Segmentation
In this paper, we want to exploit the knowledge obtained from those detected objects which are incorporated into the background model since they cease their movement. These motionl...
Ivan Huerta Casado, Daniel Rowe, Jordi Gonzà...