Sciweavers

1599 search results - page 72 / 320
» Program Analysis for Security and Privacy
Sort
View
115
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell
140
Voted
CCS
2008
ACM
15 years 5 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
125
Voted
CIKM
2009
Springer
15 years 10 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
134
Voted
CCS
2008
ACM
15 years 5 months ago
Type-checking zero-knowledge
This paper presents the first type system for statically analyzing security protocols that are based on zero-knowledge proofs. We show how several properties offered by zero-knowl...
Michael Backes, Catalin Hritcu, Matteo Maffei
123
Voted
WISA
2005
Springer
15 years 9 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...