Sciweavers

1128 search results - page 207 / 226
» Little Engines of Proof
Sort
View
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 3 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CODES
2007
IEEE
15 years 3 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
SECON
2007
IEEE
15 years 3 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
GPCE
2007
Springer
15 years 3 months ago
Simple and safe SQL queries with c++ templates
Most software applications use a relational database for data management and storage. Interaction with such a database is often done by letting the program construct strings with ...
Joseph Gil, Keren Lenz
VLDB
2007
ACM
94views Database» more  VLDB 2007»
15 years 3 months ago
iTrails: Pay-as-you-go Information Integration in Dataspaces
Dataspace management has been recently identified as a new agenda for information management [17, 22] and information integration [23]. In sharp contrast to standard information ...
Marcos Antonio Vaz Salles, Jens-Peter Dittrich, Sh...