Sciweavers

957 search results - page 94 / 192
» Modular Static Program Analysis
Sort
View
OSDI
2006
ACM
16 years 2 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
107
Voted
CSMR
2009
IEEE
15 years 9 months ago
Comparing Stability of Implementation Techniques for Multi-agent System Product Lines
Multi-agent systems (MAS) are increasingly being exploited to support autonomous recommendation of products and information to contemporary application users. Multi-agent system p...
Camila Nunes, Uirá Kulesza, Cláudio ...
DOCENG
2009
ACM
15 years 8 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
EUROMICRO
2005
IEEE
15 years 8 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
131
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 8 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...