Sciweavers

1548 search results - page 144 / 310
» Estimating Software Vulnerabilities
Sort
View
117
Voted
NETWORKING
2004
15 years 1 months ago
Self-Admission Control for IP Telephony Using Early Quality Estimation
Abstract. If quality of service could be provided at the transport or the application layer, then it might be deployed simply by software upgrades, instead of requiring a complete ...
Olof Hagsand, Ignacio Más Ivars, Ian Marsh,...
NSDI
2010
14 years 9 months ago
AccuRate: Constellation Based Rate Estimation in Wireless Networks
This paper proposes to exploit physical layer information towards improved rate selection in wireless networks. While existing schemes pick good transmission rates, this paper tak...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...
CASES
2005
ACM
15 years 1 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
PLDI
2009
ACM
16 years 9 days ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
106
Voted
NDSS
2008
IEEE
15 years 6 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...