Sciweavers

1599 search results - page 15 / 320
» Program Analysis for Security and Privacy
Sort
View
OOPSLA
1999
Springer
15 years 7 months ago
Escape Analysis for Java
Jong-Deok Choi, Manish Gupta, Mauricio J. Serrano,...
CCS
2010
ACM
15 years 3 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
SP
2002
IEEE
132views Security Privacy» more  SP 2002»
15 years 3 months ago
Automated Generation and Analysis of Attack Graphs
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richar...
128
Voted
ESORICS
2009
Springer
16 years 4 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
140
Voted
CCS
1998
ACM
15 years 7 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...