Sciweavers

3107 search results - page 334 / 622
» Error-Correcting Source Code
Sort
View
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 10 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
SIGCOMM
2012
ACM
13 years 6 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
INFOCOM
2012
IEEE
13 years 6 months ago
RISA: Distributed Road Information Sharing Architecture
—With the advent of the new IEEE 802.11p DSRC/WAVE radios, Vehicle-to-Vehicle (V2V) communications is poised for a dramatic leap. A canonical application for these future vehicul...
Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishna...
COMPSAC
2009
IEEE
15 years 8 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
PEPM
2009
ACM
15 years 8 months ago
Translation and optimization for a core calculus with exceptions
A requirement of any source language is to be rich in features and concise to use by the programmers. As a drawback, it is often too complex to analyse, causing research studies t...
Cristina David, Cristian Gherghina, Wei-Ngan Chin