Sciweavers

1599 search results - page 15 / 320
» Program Analysis for Security and Privacy
Sort
View
72
Voted
OOPSLA
1999
Springer
15 years 6 months ago
Escape Analysis for Java
Jong-Deok Choi, Manish Gupta, Mauricio J. Serrano,...
CCS
2010
ACM
15 years 2 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
88
Voted
SP
2002
IEEE
132views Security Privacy» more  SP 2002»
15 years 1 months ago
Automated Generation and Analysis of Attack Graphs
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richar...
114
Voted
ESORICS
2009
Springer
16 years 2 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
CCS
1998
ACM
15 years 6 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...