Sciweavers

3516 search results - page 174 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
119
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 9 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
SAC
2008
ACM
15 years 2 months ago
Secure deletion for NAND flash file system
In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require...
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong...
160
Voted
CCS
2011
ACM
14 years 3 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
135
Voted
ATVA
2010
Springer
135views Hardware» more  ATVA 2010»
15 years 4 months ago
Probabilistic Contracts for Component-Based Design
Abstract. We define a probabilistic contract framework for the construction of component-based embedded systems, based on the theory of Interactive Markov Chains. A contract specif...
Dana N. Xu, Gregor Gößler, Alain Giraul...
SIGOPSE
2004
ACM
15 years 8 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...