Sciweavers

1548 search results - page 35 / 310
» Estimating Software Vulnerabilities
Sort
View
ICSE
2005
IEEE-ACM
15 years 11 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
54
Voted
CODES
1999
IEEE
15 years 3 months ago
A compilation-based software estimation scheme for hardware/software co-simulation
Marcello Lajolo, Mihai Lazarescu, Alberto L. Sangi...
CCS
2009
ACM
15 years 5 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
CSMR
2003
IEEE
15 years 4 months ago
Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels
Ettore Merlo, Giuliano Antoniol, Pierre-Luc Brunel...
CODES
2000
IEEE
15 years 3 months ago
Energy estimation for 32-bit microprocessors
ר Ñ Ø ÓÒ Ó ×Ó ØÛ Ö ÔÓÛ Ö ÓÒ×ÙÑÔØ ÓÒ × ÓÑ Ò ÓÒ Ó Ø Ñ ÓÖ ÔÖÓ Ð Ñ× ÓÖ Ñ ÒÝ Ñ ÔÔÐ Ø ÓÒ׺ Ì Ô Ô Ö ÔÖ × ÒØ× ÒÓÚ Ð ...
Carlo Brandolese, William Fornaciari, Fabio Salice...