Sciweavers

1599 search results - page 79 / 320
» Program Analysis for Security and Privacy
Sort
View
CCS
2010
ACM
15 years 3 months ago
The security of modern password expiration: an algorithmic framework and empirical analysis
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by an attacker who has ...
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
OOPSLA
2004
Springer
15 years 9 months ago
Generic ownership: practical ownership control in programming languages
earch abstract outlines the work I plan to do as part of my PhD. In particular, I propose to devise a practical way of integrating ownership control into existing programming lang...
Alex Potanin, James Noble, Robert Biddle
138
Voted
CCS
2010
ACM
15 years 3 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
117
Voted
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 9 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
OOPSLA
2007
Springer
15 years 10 months ago
Inferring aliasing and encapsulation properties for java
There are many proposals for language techniques to control aliasing and encapsulation in object oriented programs, typically based on notions of object ownership and pointer uniq...
Kin-Keung Ma, Jeffrey S. Foster