Sciweavers

5255 search results - page 375 / 1051
» Formal Methods for Privacy
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
ACISP
2005
Springer
15 years 10 months ago
Tunable Balancing of RSA
We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanc...
Steven D. Galbraith, Chris Heneghan, James F. McKe...
CCS
2004
ACM
15 years 10 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
OOPSLA
2001
Springer
15 years 9 months ago
Contract Soundness for Object-Oriented Languages
Checking pre- and post-conditions of procedures and methods at runtime helps improve software reliability. In the procedural world, pre- and post-conditions have a straightforward...
Robert Bruce Findler, Matthias Felleisen
146
Voted
FMCO
2005
Springer
156views Formal Methods» more  FMCO 2005»
15 years 10 months ago
Abstraction and Refinement in Model Checking
ion and Refinement in Model Checking Orna Grumberg Technion, Haifa, Israel FMCO, Amsterdam November 2005
Orna Grumberg