Sciweavers

372 search results - page 54 / 75
» On Codings of Traces
Sort
View
ICSE
2007
IEEE-ACM
15 years 12 months ago
Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications
Although it is common in large Java programs to rethrow exceptions, existing exception-flow analyses find only single exceptionflow links, thus are unable to identify multiple-lin...
Chen Fu, Barbara G. Ryder
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 4 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
CGO
2007
IEEE
15 years 6 months ago
Ubiquitous Memory Introspection
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to atta...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
USS
2008
15 years 2 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
DAGSTUHL
2006
15 years 1 months ago
Closure and Causality
We present a model of causality which is defined by the intersection of two distinct closure systems, I and T . To present empirical evidence to demonstrate that this model has pra...
John L. Pfaltz