Sciweavers

1599 search results - page 285 / 320
» Program Analysis for Security and Privacy
Sort
View
HIPC
2005
Springer
15 years 5 months ago
Design and Implementation of the HPCS Graph Analysis Benchmark on Symmetric Multiprocessors
Graph theoretic problems are representative of fundamental computations in traditional and emerging scientific disciplines like scientific computing, computational biology and b...
David A. Bader, Kamesh Madduri
EUC
2004
Springer
15 years 5 months ago
Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation
The Distributed Object Group Framework(DOGF) we constructed supports the grouping of distributed objects that are required for distributed application. From the DOGF, we manage dis...
Chang-Sun Shin, Chang-Won Jeong, Su-Chong Joo
120
Voted
ISSTA
2012
ACM
13 years 2 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
OOPSLA
2004
Springer
15 years 5 months ago
Hard real-time: C++ versus RTSJ
In the domain of hard real-time systems, which language is better: C++ or the Real-Time Specification for Java (RTSJ)? Although standard Java provides a more productive programmin...
Daniel L. Dvorak, William K. Reinholtz
ASPLOS
2008
ACM
15 years 1 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...