Sciweavers

252 search results - page 11 / 51
» Protecting Software Code by Guards
Sort
View
ISI
2005
Springer
15 years 5 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
111
Voted
PEPM
2004
ACM
15 years 5 months ago
Declarative specialization for object-oriented-program specialization
The use of partial evaluation for specializing programs written in imperative languages such as C and Java is hampered by the difficulty of controlling the specialization process....
Helle Markmann Andersen, Ulrik Pagh Schultz
IASTEDSE
2004
15 years 1 months ago
Mapping UML statecharts to java code
The Unified Modeling Language (UML) statechart diagram is used for modeling the dynamic aspects of systems. The UML statechart diagrams include many concepts that are not present ...
Iftikhar Azim Niaz, Jiro Tanaka
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 7 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
107
Voted
EMSOFT
2005
Springer
15 years 5 months ago
Distributed-code generation from hybrid systems models for time-delayed multirate systems
Hybrid systems are an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. A simple extension, a network of comm...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...