Sciweavers

1599 search results - page 67 / 320
» Program Analysis for Security and Privacy
Sort
View
114
Voted
DRMTICS
2005
Springer
15 years 9 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
126
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
169
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
103
Voted
OOPSLA
2001
Springer
15 years 8 months ago
Modular Mixin-Based Inheritance for Application Frameworks
Mixin modules are proposed as an extension of a class-based programming language. Mixin modules combine parallel extension of classes, including extension of the self types for th...
Dominic Duggan, Ching-Ching Techaubol
130
Voted
OOPSLA
2010
Springer
15 years 2 months ago
Mostly modular compilation of crosscutting concerns by contextual predicate dispatch
The modularity of aspect-oriented programming (AOP) has been a controversial issue. To investigate this issue compared with object-oriented programming (OOP), we propose a simple ...
Shigeru Chiba, Atsushi Igarashi, Salikh Zakirov