Sciweavers

2897 search results - page 40 / 580
» Mobile Code Security
Sort
View
CCS
2003
ACM
15 years 7 months ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
CCS
2010
ACM
15 years 2 months ago
Retaining sandbox containment despite bugs in privileged memory-safe code
Justin Cappos, Armon Dadgar, Jeff Rasley, Justin S...
119
Voted
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 8 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo
144
Voted
MOBIHOC
2001
ACM
16 years 2 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
ICSE
2008
IEEE-ACM
16 years 2 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine