Sciweavers

1599 search results - page 17 / 320
» Program Analysis for Security and Privacy
Sort
View
85
Voted
CSFW
2010
IEEE
15 years 5 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
112
Voted
SAFECOMP
2007
Springer
15 years 8 months ago
Formal Specification and Analysis of AFDX Redundancy Management Algorithms
Jan Täubrich, Reinhard von Hanxleden
88
Voted
SAFECOMP
2004
Springer
15 years 7 months ago
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture
Holger Pfeifer, Friedrich W. von Henke
ESORICS
2011
Springer
14 years 1 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
153
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...