Sciweavers

1548 search results - page 30 / 310
» Estimating Software Vulnerabilities
Sort
View
SEC
2007
14 years 11 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
USS
2004
14 years 11 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
CORR
2006
Springer
106views Education» more  CORR 2006»
14 years 9 months ago
Checkbochs: Use Hardware to Check Software
In this paper, we present a system called Checkbochs, a machine simulator that checks rules about its guest operating system and applications at the hardware level. The properties...
Sorav Bansal
WCE
2007
14 years 10 months ago
Statistical Analysis for Activity-Based Software Estimation using Regression Approach
Application Service Maintenance(ASM) projects mainly use Activity-Based software estimation methodology compared to Function Point or Lines of Code Estimation methodologies[1]. Th...
M. J. Basavaraj, K. C. Shet
103
Voted
HPCA
2009
IEEE
15 years 10 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...