Sciweavers

576 search results - page 91 / 116
» Implementing a secure setuid program
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
ACSAC
2006
IEEE
15 years 8 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
VMCAI
2005
Springer
15 years 7 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
IFIP
2003
Springer
15 years 7 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 4 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...