Sciweavers

1599 search results - page 89 / 320
» Program Analysis for Security and Privacy
Sort
View
129
Voted
ACSAC
2002
IEEE
15 years 8 months ago
With Gaming Technology towards Secure User Interfaces
Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a gamefriendly platf...
Hanno Langweg
CCS
2011
ACM
14 years 3 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
137
Voted
CCS
2007
ACM
15 years 10 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
128
Voted
ESORICS
2010
Springer
15 years 4 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
122
Voted
WS
2005
ACM
15 years 9 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux