Sciweavers

2979 search results - page 540 / 596
» Modelling secure multiagent systems
Sort
View
CSFW
2011
IEEE
13 years 11 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
ESOP
2010
Springer
15 years 9 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
SAFECOMP
2007
Springer
15 years 6 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
POPL
1999
ACM
15 years 4 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
ACSW
2006
15 years 1 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark