Sciweavers

1548 search results - page 86 / 310
» Estimating Software Vulnerabilities
Sort
View
SCAM
2008
IEEE
15 years 5 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
ISSTA
2012
ACM
13 years 1 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
ESEM
2008
ACM
15 years 1 months ago
A constrained regression technique for cocomo calibration
Building cost estimation models is often considered a search problem in which the solver should return an optimal solution satisfying an objective function. This solution also nee...
Vu Nguyen, Bert Steece, Barry W. Boehm
ICIP
1999
IEEE
15 years 3 months ago
Power Spectrum Condition for Energy-Efficient Watermarking
This paper presents a model for watermarking and some attacks on watermarks. Given the watermarked signal, the so-called Wiener attack performs minimum mean-squared error (MMSE) es...
Jonathan K. Su, Bernd Girod
DCOSS
2006
Springer
15 years 2 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan