Sciweavers

42 search results - page 8 / 9
» Policies and Proofs for Code Auditing
Sort
View
ESOP
2001
Springer
15 years 2 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
14 years 4 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
INFORMATIKTAGE
2007
14 years 11 months ago
Verwundbarkeiten von Web-Anwendungen
: Web-Applikationen werden heute immer wichtiger, f¨ur viele Firmen sind sie die Haupteinnahmequelle, f¨ur einige auch die Einzige. Gleichzeitig werden diese Applikationen auch i...
Christopher Holm, Christopher Schwardt
SACMAT
2006
ACM
15 years 3 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
ENVSOFT
2007
126views more  ENVSOFT 2007»
14 years 9 months ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium ...
Jeroen P. van der Sluijs