Sciweavers

1548 search results - page 26 / 310
» Estimating Software Vulnerabilities
Sort
View
COMPSAC
2006
IEEE
15 years 3 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
OSDI
2006
ACM
15 years 9 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
IEEEARES
2008
IEEE
15 years 3 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
ACSW
2004
14 years 11 months ago
Belief-Based Risk Analysis
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang, Daniel Bradley, Svein J. Knap...
ISPASS
2005
IEEE
15 years 3 months ago
Balancing Performance and Reliability in the Memory Hierarchy
Cosmic-ray induced soft errors in cache memories are becoming a major threat to the reliability of microprocessor-based systems. In this paper, we present a new method to accurate...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...