Sciweavers

1599 search results - page 19 / 320
» Program Analysis for Security and Privacy
Sort
View
CSFW
2008
IEEE
15 years 8 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
CCS
2009
ACM
15 years 5 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
CSFW
2004
IEEE
15 years 5 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
OOPSLA
2007
Springer
15 years 8 months ago
Streamflex: high-throughput stream programming in java
Jesper Honig Spring, Jean Privat, Rachid Guerraoui...
56
Voted
OOPSLA
2005
Springer
15 years 7 months ago
Ambient-oriented programming
Jessie Dedecker, Tom Van Cutsem, Stijn Mostinckx, ...