Sciweavers

1548 search results - page 133 / 310
» Estimating Software Vulnerabilities
Sort
View
QSIC
2005
IEEE
15 years 5 months ago
A Service Workflow Management Framework Based on Peer-to-Peer and Agent Technologies
Service workflow management which consolidates multiple services to achieve business goals has become a critical issue in service-oriented computing. Due to the unique feature of ...
Jun Yan, Yun Yang, Ryszard Kowalczyk, Xuan Thang N...
VMCAI
2005
Springer
15 years 5 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
SIGSOFT
2000
ACM
15 years 3 months ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia
ICSE
1999
IEEE-ACM
15 years 3 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 3 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti