Sciweavers

37 search results - page 3 / 8
» Model-Checking for Software Vulnerabilities Detection with M...
Sort
View
120
Voted
CSE
2009
IEEE
15 years 8 months ago
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention
—Attacks on software systems are an increasingly serious problem from an economic and security standpoint. Many techniques have been proposed ranging from simple compiler modifi...
Jesse Sathre, Alex Baumgarten, Joseph Zambreno
101
Voted
VSTTE
2005
Springer
15 years 6 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
128
Voted
ISSTA
2010
ACM
15 years 5 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
99
Voted
COMPSAC
2006
IEEE
15 years 7 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
146
Voted
CASES
2005
ACM
15 years 3 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...