Sciweavers

1760 search results - page 53 / 352
» Program Analysis Using Weighted Pushdown Systems
Sort
View
POPL
1998
ACM
15 years 4 months ago
Alias Analysis of Executable Code
Recent years have seen increasing interest in systems that reason about and manipulate executable code. Such systems can generally benefit from information about aliasing. Unfort...
Saumya K. Debray, Robert Muth, Matthew Weippert
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
116
Voted
ISSAC
1998
Springer
117views Mathematics» more  ISSAC 1998»
15 years 4 months ago
Lightweight Formal Methods for Computer Algebra Systems
In this paper we demonstrate the use of formal methods tools to provide a semantics for the type hierarchy of the AXIOM computer algebra system, and a methodology for Aldor progra...
Martin Dunstan, Tom Kelsey, Steve Linton, Ursula M...
SIGMOD
2012
ACM
345views Database» more  SIGMOD 2012»
13 years 2 months ago
Shark: fast data analysis using coarse-grained distributed memory
Shark is a research data analysis system built on a novel rained distributed shared-memory abstraction. Shark marries query processing with deep data analysis, providing a unifie...
Cliff Engle, Antonio Lupher, Reynold Xin, Matei Za...
CODES
2007
IEEE
15 years 6 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...