Sciweavers

391 search results - page 33 / 79
» On Time-Aware Instrumentation of Programs
Sort
View
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 8 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
ECOOP
2003
Springer
15 years 7 months ago
Open APIs for Embedded Security
Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
Carl A. Gunter
ICRA
2002
IEEE
96views Robotics» more  ICRA 2002»
15 years 6 months ago
A Suite of Tools for Debugging Distributed Autonomous Systems
This paper describes a set of tools that allows a developer to instrument an autonomous control system to log data at run-time and then analyze that data to verify correct program...
David Kortenkamp, Reid G. Simmons, Tod Milam, Joaq...
POPL
2000
ACM
15 years 6 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
14 years 8 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...