Sciweavers

5355 search results - page 513 / 1071
» Modules
Sort
View
ESOP
2010
Springer
16 years 2 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
VMCAI
2010
Springer
16 years 2 months ago
Shape Analysis of Low-Level C with Overlapping Structures
Abstract. Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this r...
Jörg Kreiker, Helmut Seidl, Vesal Vojdani
ESSOS
2010
Springer
16 years 1 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
CISIS
2010
IEEE
15 years 12 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
15 years 12 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...