Sciweavers

1599 search results - page 30 / 320
» Program Analysis for Security and Privacy
Sort
View
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 6 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
55
Voted
OOPSLA
2004
Springer
15 years 7 months ago
Measuring the dynamic behaviour of AspectJ programs
Bruno Dufour, Christopher Goard, Laurie J. Hendren...
OOPSLA
2007
Springer
15 years 8 months ago
Understanding programmer language
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
Einar W. Høst
AGENTS
1999
Springer
15 years 6 months ago
Shopbot Economics
Abstract. Shopbots are agents that search the Internet for information pertaining to the price and quality of goods or services. With the advent of shopbots, a dramatic reduction i...
Jeffrey O. Kephart, Amy R. Greenwald
97
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma